WO1997003399A1 - Method and apparatus for managing applications in a network - Google Patents

Method and apparatus for managing applications in a network Download PDF

Info

Publication number
WO1997003399A1
WO1997003399A1 PCT/US1996/011263 US9611263W WO9703399A1 WO 1997003399 A1 WO1997003399 A1 WO 1997003399A1 US 9611263 W US9611263 W US 9611263W WO 9703399 A1 WO9703399 A1 WO 9703399A1
Authority
WO
WIPO (PCT)
Prior art keywords
application
attribute
database
ofthe
attributes
Prior art date
Application number
PCT/US1996/011263
Other languages
French (fr)
Inventor
Kelly Sonderegger
Kevin L. Hopton
Matthew G. Brooks
Andy Lawrence
Damon Janis
Lori K. Dayton
Thomas B. Oldroyd
Original Assignee
Novell, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Novell, Inc. filed Critical Novell, Inc.
Priority to DE69616329T priority Critical patent/DE69616329T2/en
Priority to CA002226360A priority patent/CA2226360C/en
Priority to JP9505887A priority patent/JPH10511201A/en
Priority to EP96923633A priority patent/EP0838055B1/en
Publication of WO1997003399A1 publication Critical patent/WO1997003399A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/465Distributed object oriented systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating

Definitions

  • the present invention relates to the management of application programs in a computer
  • the servers typically provide file access, printer access, and other services to users who are stationed at the client machines.
  • Some large networks contain
  • Network administrator or "administrator.” Persons who use the network are known as “users.” Administrators are also users.
  • strators to locate particular executable codes. The situation is much worse for users who are
  • program such as drive mappings, printer port requirements, working directory names, scripts,
  • the present invention provides a method and apparatus for centrally managing applica-
  • One aspect ofthe present invention provides a modified
  • the database schema defines what type of resources can be represented in the
  • the database provides network administrators with an efficient and effective way to
  • the resources represented in the modified database include application programs, such as word processors and spreadsheets, that reside on the network.
  • application programs such as word processors and spreadsheets
  • provided by the present invention support the creation, deletion, and alteration of application
  • Novell NetWare® networks presently used on Novell NetWare® networks.
  • Each application object represents one application program and its execution
  • each application object includes the location of at least
  • blue brief textual description
  • database such as hierarchical organization, access control, replication of database objects to
  • the present invention also provides an application launcher.
  • the present invention also provides an application launcher.
  • the present invention also provides an application launcher.
  • the present invention also provides an application launcher.
  • application launcher allows a user to browse through the application objects which represent the
  • the launcher also automatically launches specified "auto start” applications when a user runs the
  • the launcher updates a list of available applications that is associated with
  • the launcher uses the information in the
  • Resource setup typically involves mapping drives and capturing
  • printer ports as needed; setup may also involve running a startup script.
  • the launcher cleans up by unmapping drives, releasing captured ports, and detaching
  • Cleaning up also includes running a shutdown script if one is provided.
  • the present invention provides a computer-implemented method and apparatus for
  • Consistency is achieved by gathering the information into a central
  • Database which is accessed through specified administrator tools and user interfaces.
  • Figure 1 is a diagram illustrating a computer network.
  • Figure 2 is a diagram illustrating components ofthe computer network of Figure 1
  • FIG. 3 is a flowchart illustrating an event-driven embodiment of application
  • Figure 4 is a flowchart illustrating an alternative command-driven embodiment ofthe
  • Figure 5 is a flowchart further illustrating an application management routine for
  • Figure 6 is a flowchart further illustrating attribute definition and addition steps ofthe
  • Figure 7 is a flowchart further illustrating class definition and addition steps ofthe
  • Figure 8 is a flowchart further illustrating an application launcher according to the
  • Figure 9 is a flowchart further illustrating an application launching step shown in Figure 8.
  • Figure 10 is a flowchart further illustrating a resource setup step shown in Figure 9.
  • Figure 1 1 is a flowchart further illustrating drive mapping, port capturing, and server
  • the present invention relates to a method and apparatus for managing application
  • object code "executable code,” and “executable” are likewise used interchangeably.
  • One ofthe many networks suited for use with the present invention is indicated generally at 10
  • the network 10 includes Novell NetWare® software, version 1,
  • the illustrated network 10 includes
  • Each local network 12 includes a file server 14 and one or
  • a printer 18 and an array of disks 20 are also attached to the network 10.
  • the network 10 includes a
  • the network resources 22 are administered through certain directory services 24.
  • the network resources 22 are administered through certain directory services 24.
  • directory services 24 administer both the location ofthe resources 22 and the rights of network
  • the directory services 24 include services provided
  • NSS NetWare Directory Services
  • Novell, Inc. of Orem, Utah NetWare Directory Services is a trademark of Novell, Inc..
  • directory services 24 component includes a schema 28.
  • the schema 28 was a default schema 30 that did not support application objects.
  • the present invention is an extended schema 32 which does support application objects.
  • the schemas 28, 30, and 32 each include a set of "attribute syntax" definitions, a set of
  • Each attribute syntax in the schema 28 is specified by an attribute syntax name and the
  • Attribute syntaxes thus conespond roughly to data types such as integer, float, string, or Boolean
  • Each attribute in the schema 28 has certain information associated with it.
  • Each attribute in the schema 28 has certain information associated with it.
  • the attribute name identifies the attribute
  • attribute syntax limits the values that are assumed by the attribute. For instance, the
  • default schema 30 includes an attribute of syntax type integer having the name "supported
  • Each object class in the schema 28 also has certain information associated with it.
  • Each class has a name which identifies this class, a set of super classes that identifies the other classes
  • Each object class also has a container flag and an effective flag.
  • the container flag
  • class indicates whether the class is a container class, that is, whether it is capable of containing
  • the effective flag indicates whether instances ofthe class can be
  • Non-effective classes are used only to define attributes that will be inherited by other
  • each object class groups together certain attributes.
  • a class are those attributes that can be used to name instances ofthe class.
  • attributes of a class are those attributes that must exist in each valid instance ofthe class and/or
  • class are those attributes that may, but need not, exist in each valid instance ofthe class.
  • Optional attributes of a parent class become optional attributes of a child class which inherits
  • the child inherits, in which case they are also mandatory in the child.
  • An object is an instance of an object class. Different objects ofthe same class have the same
  • the directory services 24 also include an interface library 34 which provides access to
  • the schema 28 is an API-extensible schema in that the
  • API Programmers' Interface
  • the interface library 34 includes tables or commands stored in
  • the interface library 34 includes a set of routines that are
  • library 34 includes an API that defines an interface to an NWDSxxx() library 36 which is
  • NWDS NetWare Directory Services
  • the database 38 contains objects 49 and 51 that are defined according to the schema 28
  • the database 38 is a "hierarchical" database 38 because the objects 49 and 51 in the
  • database 38 are connected in a hierarchical tree structure. Objects in the tree that can contain
  • container objects other objects are called "container objects" and must be instances of a container object class.
  • the database 38 is also a "synchronized-partition" database 38.
  • the database 38 is
  • the database 38 includes a Novell NetWare Directory Services database ("NDS database”)
  • Typical administrator tools 42 include partition
  • the present invention supplements the previously available administrator tools 42 by
  • application objects 49 to the database 38 and other features ofthe present invention make application programs 23 available to network administrators and users in a previously unknown, uniform, convenient, and efficient manner.
  • the present invention also provides users with an application launcher 50 for initiating
  • present invention provides desktop attributes on user, group, and container objects 51 which
  • the schema 28 and the database 38 include a tangible embodiment stored in one or more
  • Suitable storage devices include floppy disks, hard disks, tape, CD-
  • Each program storage device is readable by one or
  • Each program storage device tangibly embodies a program, functions, or instructions that are executable by the machines 14 and/or 16 to
  • the application management routines 48 are located in a "snap-in"
  • module 54 stored in a .DLL file on a disk in the Microsoft® WindowsTM environment ("Micro-
  • Figure 3 illustrates steps that are taken by the snap-in module 54 to modify the directory services
  • module 54 provide network administrators with control over application objects 49 by adding
  • routines 48 could also be
  • NWAdmin is a commercially owned by programs other than NWAdmin.
  • the module 54 extends NWAdmin to support application objects 49.
  • the initial step taken by the snap-in module 54 is a
  • registration step 60 which registers the snap-in module 54 with NWAdmin.
  • routines 48 are registered with another administration program to make them
  • the snap-in module 54 the first application object procedure
  • SnapinApplicationProc() a function which receives and processes messages from
  • SnapinApplicationProc() also manages device
  • SnapinApplicationProc() invokes NWAAddClassData() to register with NWAdmin
  • Browsing may be performed with a
  • SnapinApplicationProc() registers the following set of bitflags: NWA_OP_DETAILS,
  • NWA_OP_RENAME NWA_OP_DELETE, NWA_OP_DSTYPE, NWA_OP_CREATE.
  • SnapinApplicationProc() then creates a local copy ofthe
  • SnapinApplicationProc() retums the number of
  • SnapinApplicationProc() registers the next interface page with NWAdmin.
  • SnapinApplicationProc() invokes a
  • SnapinApplicationProc() removes any relevant licensing certificate and deletes the
  • SnapinApplicationProc() frees the memory it allocated, closes files (if any) that it
  • SnapinApplicationProc() also invoke NWARemoveClassData() to remove the bitmaps added earlier to NWAdmin's class tables.
  • Some embodiments remove the new application object classes from the schema 28; altemative
  • SnapinDesktopProcO which receives and processes
  • DesktopProcO creates and registers with NWAdmin an interface page titled "Desktop Objects.”
  • SnapinDesktopProcO takes care to identify aliases and to allow changes to desktop
  • SnapinDesktopProcO steps such as modifying or closing steps, are readily determined by
  • the registration step 60 is followed by a query step
  • the query step 62 determines whether additional
  • Suitable modifications include defining new attributes and/or new object classes.
  • the query step 62 queries the user to obtain authority to perform the identified
  • the snap-in module 54 performs
  • the context is captured by the following sequence
  • Context CreateContext(); NWDSSetContext( Context, DCK_NAME_CONTEXT, DS_ROOT_NAME );
  • variable Context is of type NWDSContextHandle, and is a buffer used by NWDSxxx()
  • the variable UserName is an anay of characters which contains the name ofthe user who
  • CreateContext() is a snap-in module 54 function which invokes
  • NWDSCreateContext() to create a local copy ofthe context, calls NWDSGetContext() to create a local copy ofthe context.
  • NWDSSetContext() DCV_TYPELESS_NAMES, DCV_XLATE_STRINGS,
  • desktop objects 51 with database rights which include both the object's cunent rights and the
  • the snap-in module 54 goes into an event handling loop
  • the event handling loop also supports conventional steps such as
  • Figure 4 illustrates one altemative embodiment ofthe routines 48 of Figure 2 in the form of a command-driven administrator tool 72.
  • command-driven tool 72 contain co ⁇ esponding components which accomplish similar
  • the command-driven tool 72 responds to an
  • initialize command with an initialization step 74 which initializes bitmaps, interface pages,
  • the command-driven tool 72 responds to a "configure browser" command with a
  • browser configuration step 76 which sets default filter characteristics of a browser. Suitable
  • browser filter characteristics include the name of an object class, a flag indicating whether to
  • Suitable browser filter characteristics also include contextual information such
  • the command-driven tool 72 responds to a "create object" command with a browser
  • step 78 initiates or resumes execution ofthe browser, thereby allowing the administrator to scan
  • the browser enablement step 78 initiates
  • the object creation enablement step 80 obtains the path name of a new object 49 or 51
  • One embodiment converts the path name to a Universal Naming
  • the object creation enablement step 80 creates an
  • one embodiment ofthe step 80 first creates a local
  • NWDSSetContext() is then called to
  • NWDSAddObject() is invoked with the context and cunent mandatory attribute values as
  • a modification step 82 taken in response to a "modify" command performs in a manner
  • the modification step 82 invokes
  • the object 49 attributes after updating a local buffer is allocated and initialized substantially as in the object creation step 80 and then overwritten with the modifying values.
  • the modification step 82 then invokes NWDSModifyObject() to make the requested changes.
  • a remove license step 84 is taken in response to a delete command.
  • step 84 communicates with the licensing server and/or takes other steps readily determined by
  • object step 86 then invokes standard NWDSxxx() or equivalent routines to delete the selected
  • a close-and-clean-up step 88 closes opened files, detaches from the directory service 24,
  • the step 88 gives the administrator the option of restoring the database 38 and/or
  • the schema modification step 64 includes an attribute
  • definition and addition step 90 which in turn includes separate definition and addition steps 91
  • the step 91 defines and adds a "desktop" attribute having a distinguished name attribute
  • the desktop attribute takes as its value a list of application objects 49 that
  • the desktop attribute is added to the User, Organizational Role, Group,
  • the term “desktop object” includes any object 51 in the database 38
  • desktop attributes which is an instance of a class containing the desktop attribute.
  • Associating desktop attributes with container classes allows application objects 49 to be located on desktops 52 that are
  • the desktop attribute is added to a
  • step 91 invokes
  • memsetO to initialize a struct in RAM to hold the new attribute's values, and then sets the syntax
  • NWDSInitBuf() NWDSPutAttrName(), NWDSModifyClassDef(), and NWDSFreeBuf() with
  • the step 93 defines and adds an "auto start" attribute having a typed name attribute
  • the auto start attribute takes as its value a list of application objects 49 that
  • desktop object 51 read and compare rights to all the application object 49's attributes, as well as
  • the auto start attribute is added to the desktop classes.
  • these classes In one embodiment these classes
  • the auto start attribute is added to a subset of these classes and/or to
  • the step 96 defines and adds a "launcher configuration" attribute having a stream
  • configuration attribute takes as its value a stream.
  • an integer in
  • attribute syntax is used and the attribute's values are treated as bitflags and/or bitfields.
  • the launcher configuration attribute contains various indications regarding the desired
  • Suitable indications include an indication whether the application
  • launcher 50 should use its default settings, indications regarding icon refresh, an indication
  • Suitable refresh indications include an indication whether the user is allowed to manually
  • application object 49 icons should be automatically refreshed after each time interval of a specified length elapses. Icon refresh is discussed further in connection with Figure 8.
  • embodiments contain different launcher configuration indications.
  • the launcher configuration attribute is added to the User
  • configuration attribute is added to different or additional desktop classes.
  • the step 98 defines and adds an "icon" attribute having a stream attribute syntax
  • the icon attribute takes as its value a
  • icon data defining one or more icons for an application 23 is
  • the step 100 defines and adds a "file path" attribute having a case ignore string attribute
  • file path attribute takes as its
  • server name is maintained in a separate
  • the file path attribute is multi-valued rather than single-valued, and contains one or more executable file paths. Listing several file paths increases the possibility of launching an
  • the file path attribute is
  • fault tolerance is
  • fault tolerance object 53 includes a list which references a plurality of application objects 49.
  • One suitable embodiment ofthe list uses an "altemate application objects" attribute having a
  • attribute may be added to the generic application objects class.
  • the network administrator places application objects 49
  • the application launcher 50 could easily locate a replacement application object 49 to
  • the step 102 defines and adds a "working directory" attribute having a case ignore string
  • attribute takes as its value the full path (including server name) to the application's working
  • the working directory attribute is added to the generic application objects class.
  • the step 104 defines and adds a "flags" attribute having an integer attribute syntax
  • the flags attribute is multi-valued.
  • the flags attribute value is treated as a bitset. In one embodiment the bits indicate whether to
  • the step 106 defines and adds a "blurb" attribute having a case ignore string attribute
  • the blurb value is a short description ofthe
  • blurb attribute may be used as a brief identifier to access the application object 49 in the
  • the blurb attribute is added to the generic application objects class.
  • the steps 108 and 110 define and add a "startup script” and a “shutdown script” attribute,
  • Each script attribute has a stream attribute syntax and the Single- Valued flag.
  • startup script attribute value is a script to run before the application 23 executes, while the
  • shutdown script attribute value is a script to run after the application 23 terminates.
  • each script is in NetWare Login Script format.
  • the script attributes are added to
  • the step 1 12 defines and adds a "licensing" attribute having a stream attribute syntax
  • the licensing value includes information
  • the licensing attribute is added to the generic application objects class.
  • the step 114 defines and adds a "parameters" attribute having a case ignore string
  • the parameters attribute has a stream attribute syntax.
  • the parameters attribute value includes
  • command line parameters to be passed to the application 23 when it is launched.
  • the step 116 defines and adds a "drive mappings" attribute having a case ignore string
  • the drive mappings attribute value includes a list of drives which must be
  • the step 118 defines and adds a "printer ports" attribute having a case ignore string
  • the printer ports attribute value includes a list of printer ports which must be
  • the step 120 defines and adds a "contacts" attribute having a distinguished name attribute syntax.
  • the contacts attribute value includes a list of other network users who may be
  • ments ofthe invention define one or more ofthe attributes differently than the illustrative
  • one or more ofthe attributes sets the Non-removable flag and/or uses a different attribute syntax.
  • the step 90 defines and adds a "handler" attribute having
  • the handler attribute value includes a list of handlers
  • the step 90 defines and adds a "searchmap path" attribute
  • the searchmap path attribute value includes a
  • the step 90 defines and adds a "catch-all" attribute having
  • the catch-all attribute value includes application-defined values
  • a step ofthe present invention adds a "see also" attribute
  • the see also attribute value includes a list of
  • desktop objects having a desktop attribute whose value includes the name ofthe application
  • step 90 of defining and adding new attributes is
  • step 94 defines and adds one or more platform-specific
  • Definition and addition of a class in the schema 28 includes a step 122 of allocating and
  • step 122 initializing a buffer to hold information about the new class.
  • step 122 the step 122
  • the new class are defined by successive calls to NWDSBeginClassItem() and NWDSPut-
  • the steps 128, 130, and 132 includes an initial call to NWDSBeginClassItem() followed by calls
  • NWDSPutClassItemO for each ofthe naming attributes, each ofthe mandatory attributes, and each ofthe optional attributes, respectively.
  • step 92 defines and adds to the schema 28 a generic application objects class which has Top as
  • the description attribute's value is a name that appears
  • the file path attribute is optional rather than mandatory.
  • application object would contain a script only, with no ultimate executable launched and tumed
  • the generic class's optional attributes include the following attributes defined in the step
  • One embodiment ofthe step 94 defines and adds to the schema 28 a platform-specific
  • This Windows application class is an effective non-
  • NT is a registered trademark of Microsoft Co ⁇ oration
  • the application launcher 50 is associated with the
  • launcher 50 and the application management routines 48 are combined in a single tool, similar to
  • the application launcher 50 executes to then launch that application object 49.
  • the application launcher 50 executes to then launch that application object 49.
  • the application launcher 50 executes to then launch that application object 49.
  • the container 16 reads a user object's container object in the database 38 when a user logs on.
  • object has a stream syntax "application launcher bootstrap” attribute which contains the
  • One method of the present invention includes the step of reading executable launcher code from the application launcher bootstrap attribute in
  • the launcher 50 performs a reading step 139. During the
  • the launcher 50 reads the cu ⁇ ent value ofthe launcher configuration attribute
  • the value ofthe launcher configuration attribute as well as the
  • buffers are allocated in the schema 28 by invoking NWDSAllocBuf(). One buffer will hold the
  • the first buffer is initialized by calling NWDSInitBuf(). Calls are then made to
  • AttrValSize() is called to determine the amount of memory needed by the launcher 50 to hold
  • NWDSFreeBuf() is then called twice to free the two database
  • the launcher 50 also performs an auto start launching step 140 to launch each ofthe
  • enor messages are provided to the user and/or to the network administrator
  • the icon for an application 23 is preferably stored in the icon attribute in
  • launcher 50 performs a get-icons step 142 to obtain from the directory services database 38 the
  • the get-icons step 142 is accomplished using software which is
  • the icon.c file is
  • icon.c is modified to retum a pointer to an OWL Ticon structure rather than a
  • the launcher 50 performs browsing and/or searching as
  • Suitable browsers for performing the step 143 include without limitation
  • Searching during the step 143 may include specifying search parameters or
  • Searching may also include a specification of how
  • One such command orders the launcher 50 to perform a manual
  • Icon refresh is useful because the network administrator may have added
  • the launcher 50 maintains an intemal list of application objects 49 for which icons are
  • the manual refresh step 144 causes the launcher 50 to scan a portion ofthe
  • the portion ofthe database 38 hierarchy searched is specified by the container levels value stored in the launcher configuration attribute ofthe user and container objects.
  • timestamps are used to detect
  • the user may also order the launcher 50 to perform a viewing step 146.
  • step 146 displays the cunent values of predetermined attributes.
  • One embodiment displays all
  • attributes such as the parameters attribute and/or the contacts attribute.
  • the user In connection with the viewing step 146, the user is able to ask a contact for help during
  • the asking step 148 includes viewing the cunent value
  • the launcher 50 initiates email co ⁇ e ⁇
  • the user may also select a specific application 23 and order the launcher 50 to
  • the application 23 is selected for launching by double-clicking a mouse button
  • the launcher 50 also takes certain steps not
  • the launcher 50 maintains an intemal stmcture that
  • information includes user interface information such as drive mappings, printer port captures,
  • the launcher 50 detects termination of an
  • application 23 by polling, by an interrupt or event notification, or by other familiar means.
  • the launcher 50 updates the launcher 50
  • the cleaning step 154 which
  • an icon updating step 156 is also performed without a direct user request.
  • the icon updating step 156 is substantially similar to the
  • launching a user-selected application 23 includes a single performance ofthe launching step 158.
  • the launching step 158 includes a disabling step 160
  • step 156 Disabling the updating steps 152 and 156 simplifies subsequent steps ofthe launching
  • step 158 by preventing inconsistencies in the launcher 50's status information.
  • a resource setup routine then sets up resources needed by the
  • the setup step 162 also sets standard flags that
  • a process initialization step 164 invokes an operating system routine or other process
  • initializer to initialize a process control block or similar process control stracture used by the
  • the step 164 also allocates a processor to a process, task, or thread conesponding to the application 23.
  • a processor to a process, task, or thread conesponding to the application 23.
  • the step 164 includes a call to ShellExecute() or CreateProcess().
  • An update status step 166 then updates the launcher 50's intemal application status
  • An enabling step 168 then reverses the disabling effects ofthe step 160. This allows the
  • a control transferor transfers control of a processor in the
  • the launcher 50 suspends itself, invokes
  • the step 170 includes a call to Yield().
  • step 164 may be combined with the step 170 in environments which
  • disabling step 160 and the enabling step 168 are omitted in embodiments which do not use
  • a reading step 174 reads the value ofthe flags
  • the launcher 50 launches the application 23 telling it to run
  • a drive mapping step 176 follows the sequence described in Figure 11. In the drive
  • mapping step 176 the "resources" refe ⁇ ed to in Figure 11 are disk drives and the step of
  • mapping includes mapping a drive.
  • a port capturing step 178 likewise follows the sequence
  • claiming includes capturing a printer port for use by the application 23.
  • an attaching step 182 determines the location ofthe executable code for the application 23, an attaching step 182 also
  • the resources are servers
  • the step 180 of determining the executable code location utilizes
  • step 180 preferably includes string manipulations to create an UNC name.
  • environment variables In other embodiments environment
  • the step 184 may also include a conversion to the UNC format.
  • a step 186 of determining the command line parameters may utilize both the
  • environment variables may be ignored.
  • Figure 11 illustrates the stmcture of each ofthe steps 176, 178, and 182 of Figure 10.
  • querying step 188 determines whether additional resource claims made by the application 23
  • mappings listed in the drive mappings attribute have been addressed by the launcher 50.
  • the querying step 188 similarly determines whether any additional
  • printer ports need to be captured by checking the printer ports attribute, and in the server
  • a second querying step 190 determines that the resource has not been
  • a claiming step 192 claims the resource for the application 23.
  • the second querying step 190 examines the intemal status information
  • the claiming step 192 provides substantially the same
  • step 192 provides substantially the same functionality as the familiar DOS capture command.
  • the claiming step 192 calls
  • a third querying step 194 is taken.
  • step 194 determines whether the previous claim and the claim sought by the application 23 are
  • the third querying step 194 passes control to an enor
  • the third querying step 194 similarly compares previously made port
  • the third querying step 194 typically finds no enor because desktops 52 can
  • an incrementing step 198 increments a use
  • inventions include a computer-readable storage medium in combination with the specific physical
  • configuration represents data and instructions which cause the computers 14 and 16 to operate in
  • Suitable storage devices include floppy
  • Each such medium tangibly embodies a program, functions, and/or instructions that are executable by the machines 14 and/or 16 to perform application
  • Database 38 and desktop 52 updates and refreshes are performed with the

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Automation & Control Theory (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Computer And Data Communications (AREA)

Abstract

A method and apparatus for management of application programs in a computer network are disclosed. A modified hierarchical database which includes application objects that represent applications and their execution environments is utilized. Administrator tools support the creation, deletion, and modification of application objects. Each application object includes the location of an executable code for a given application, an icon, a working directory name, drive mappings, printer port captures, command line parameters, and similar information. An application launcher queries the database and updates a list of available applications which is kept in the user's desktop. The launcher automatically launches specified applications when a user runs the launcher. The launcher also uses the information in the application object to set up resources needed by the application, to create a process that executes the application, and to clean up after the application terminates. Resource setup involves mapping drives and capturing printer ports as needed. The database, the launcher, and the administrator tools allow consistent tracking and use of information about application programs and their execution environments in the network.

Description

METHOD AND APPARATUS FOR MANAGING APPLICATIONS IN A NETWORK
FIELD OF THE INVENTION
The present invention relates to the management of application programs in a computer
network, and more particularly to a method and apparatus for managing applications in a multi-
server network through the use of application objects in a hierarchical directory services
database.
TECHNICAL BACKGROUND OF THE INVENTION
It is not unusual for a modern computer network to contain several server machines as
well as numerous client machines. The servers typically provide file access, printer access, and other services to users who are stationed at the client machines. Some large networks contain
dozens of servers and hundreds of clients. The person responsible for administering the network
is known as the "network administrator" or "administrator." Persons who use the network are known as "users." Administrators are also users.
A wide variety of application programs such as word processors, spreadsheets, database
managers, program development tools, and the like (collectively, "applications") are typically
found on one or more servers in the network. However, applications are often under-utilized.
Sometimes a potential user does not know whether a particular application would be helpful
because the user is unfamiliar with that application. Sometimes applications could be made
available to those who would benefit from their use, but the necessary file access rights and
execution environment have not been provided by the administrator. Sometimes a user who is
familiar with an application does not realize that the application was recently placed on the
network. Even if a user wishes to execute a particular application and believes that the executable
code for that application exists somewhere on the network, the user still must locate and access
that code in order to utilize the application. Unfortunately, the executable codes for applications are often scattered amongst many servers, thereby making it difficult at times even for admini-
strators to locate particular executable codes. The situation is much worse for users who are
unfamiliar with the technical aspects of network organization and administration. Because such
users are often unable to locate the desired executable codes and/or create appropriate execution
environments, they are unnecessarily prevented from using helpful applications.
More experienced users often manually maintain records ofthe locations of certain
application executables, but this approach has several drawbacks. Often, a user does not initially
know where a particular executable is located. Scanning the directories of numerous servers to
locate an executable is a possible approach. But scanning directories is potentially very time-
consuming, particularly if it becomes necessary to attach the user's client machine to numerous
servers to access their directories. Asking a network administrator where to find a particular
program is also possible, but repeatedly answering such queries from many users takes signifi¬
cant time away from other tasks that require the administrator's attention and expertise. Keeping
manual records requires maintenance each time an executable's location is changed, thereby
cutting into the time the user and/or administrator could be devoting to other duties.
In addition to an executable code, other resources are typically required by an application
before it can successfully execute. In some cases it is necessary to map drives, to capture printer
ports, or to specify a working directory for files which will hold mtermediate or final data
produced by the application. Access to files or directories may require that the user have read-
write, or other rights. In some network environments a particular application will run more
efficiently or effectively if its execution is preceded by a set of commands found in a startup script, or if its execution is followed by a set of commands found in a shutdown script. Many
applications allow or require parameters to be passed to the application's executable code on the
same command line which invokes that code.
Thus, in addition to maintaining the location ofthe executable code, users and
administrators who manually maintain records regarding applications often find it helpful or
necessary to maintain additional information regarding the execution environment of each
application, such as drive mappings, printer port requirements, working directory names, access
rights, scripts, and command line parameters. In practice this additional information is at least
as widely scattered as the executable codes and is often stored in different formats by different
persons. Many users lack the expertise, the time, or both, to manually manage such information.
After an application has been on the network for some time, it is not unusual for inconsistent versions of execution environment information to be found in different formats on different
machines throughout the network.
Thus, it would be an advancement in the art to provide a computer-implemented method
and apparatus for consistently tracking the location of application program executable codes in a
network.
It would also be an advancement to provide such a method and apparatus which reduce
the administrative effort associated with changes in the location of application program
executable codes or changes in other information needed to execute an application.
It would be a further advancement to provide such a method and apparatus for
consistently tracking and employing additional information used to execute an application
program, such as drive mappings, printer port requirements, working directory names, scripts,
and/or command line parameters. Such a method and apparatus are disclosed and claimed herein.
BRIEF SUMMARY OF THE INVENTION
The present invention provides a method and apparatus for centrally managing applica-
tion programs in a computer network. One aspect ofthe present invention provides a modified
database schema. The database schema defines what type of resources can be represented in the
database. The database provides network administrators with an efficient and effective way to
determine what resources are available on the network, to provide fault-tolerance by making
resources available even if a server on the network becomes unavailable, and to control the
access of particular network users or groups of users to particular network resources.
The resources represented in the modified database include application programs, such as word processors and spreadsheets, that reside on the network. The modifications to the schema
provided by the present invention support the creation, deletion, and alteration of application
objects in the database. In one embodiment, administrative routines for managing application
objects are provided through a "snap-in" module that extends the familiar NW Admin tool
presently used on Novell NetWare® networks.
Each application object represents one application program and its execution
environment. Thus, in one embodiment each application object includes the location of at least
one executable code for the application in question, a brief name which textually identifies the
application, an icon which graphically identifies the application, the location ofthe application's
working directory, the drive mappings and printer port captures needed by the application, and
the command line parameters (if any) that should be passed to the application when it begins
execution. Alternative embodiments of application objects include additional useful information
such as a brief textual description ("blurb") describing the application to potential new users, a list of other users who can be contacted to answer questions about the application, licensing
information, and scripts to run before and/or after execution ofthe application.
Collecting such information about each application into one application object in the
database assists greatly in preventing the creation or use of inconsistent or obsolete information
about the application. Moreover, application objects receive the beneficial characteristics ofthe
database such as hierarchical organization, access control, replication of database objects to
provide fault-tolerance, and access through familiar interface tools.
The present invention also provides an application launcher. In one embodiment, the
application launcher allows a user to browse through the application objects which represent the
applications available to that user and to view the infoπnation currently stored in the objects.
The launcher also automatically launches specified "auto start" applications when a user runs the
launcher. In addition, the launcher updates a list of available applications that is associated with
the user's desktop by querying the database. The launcher's update capability relieves
administrators ofthe need to manually update each user's desktop when a new application is
added to the network or an established application is moved.
When it is requested to launch an application, the launcher uses the information in the
application's database object to setup execution environment resources needed by the
application, to then create a process which executes the application, and to finally clean up after
the application terminates. Resource setup typically involves mapping drives and capturing
printer ports as needed; setup may also involve running a startup script. After the application
terminates, the launcher cleans up by unmapping drives, releasing captured ports, and detaching
from servers as needed. Cleaning up also includes running a shutdown script if one is provided.
Thus, the present invention provides a computer-implemented method and apparatus for
consistently tracking and employing information about application programs and their execution environments in a network. Consistency is achieved by gathering the information into a central
database which is accessed through specified administrator tools and user interfaces. Database
updates are readily performed with the administrator tools or by the application launcher,
thereby reducing the effort associated with changes in the location of executables or in the other
information needed to execute an application.
The features and advantages ofthe present invention will become more fully apparent
through the following description and appended claims taken in conjunction with the
accompanying drawings.
BRIEF DESCRIPTION OF THE DRAWINGS
To illustrate the manner in which the advantages and features ofthe invention are
obtained, a more particular description ofthe invention summarized above will be rendered by
reference to the appended drawings. Understanding that these drawings only provide selected embodiments ofthe invention and are not therefore to be considered limiting of its scope, the
invention will be described and explained with additional specificity and detail through the use
ofthe accompanying drawings in which:
Figure 1 is a diagram illustrating a computer network.
Figure 2 is a diagram illustrating components ofthe computer network of Figure 1
together with administrator tools and user tools employed in conjunction with the computer
network.
Figure 3 is a flowchart illustrating an event-driven embodiment of application
management routines according to the present invention for supplementing the administrator
tools and the network shown in Figure 2. Figure 4 is a flowchart illustrating an alternative command-driven embodiment ofthe
application management routines ofthe present invention.
Figure 5 is a flowchart further illustrating an application management routine for
modifying a network database schema according to the present invention.
Figure 6 is a flowchart further illustrating attribute definition and addition steps ofthe
routine shown in Figure 5.
Figure 7 is a flowchart further illustrating class definition and addition steps ofthe
routine shown in Figure 5.
Figure 8 is a flowchart further illustrating an application launcher according to the
present invention.
Figure 9 is a flowchart further illustrating an application launching step shown in Figure 8.
Figure 10 is a flowchart further illustrating a resource setup step shown in Figure 9.
Figure 1 1 is a flowchart further illustrating drive mapping, port capturing, and server
attaching steps shown in Figure 10.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
The present invention relates to a method and apparatus for managing application
programs in a computer network that includes hardware, software, and data components. In
describing the present invention and its context, the terms "program," "module," "routine,"
"subroutine," "function," and "procedure" are used interchangeably because the technical
differences between these software components do not alter the scope ofthe present invention.
The terms "object code," "executable code," and "executable" are likewise used interchangeably.
As used herein, the term "embodiment" encompasses specific methods, specific apparatus, and specific program storage devices or articles of manufacture which are provided by the present
invention.
Reference is now made to the figures wherein like parts are referred to by like numerals.
One ofthe many networks suited for use with the present invention is indicated generally at 10
in Figure 1. In one embodiment, the network 10 includes Novell NetWare® software, version
4.x (NetWare is a registered trademark of Novell, Inc.). The illustrated network 10 includes
several connected local networks 12. Each local network 12 includes a file server 14 and one or
more user stations 16. A printer 18 and an array of disks 20 are also attached to the network 10.
Although a particular network 10 is shown, the present invention is also useful in a variety of
other networks which are known to one of skill in the art.
With reference to Figures 1 and 2, administration and use ofthe network 10 are
supported by network software and hardware elements, by administrator tools, and by user tools.
Figure 2 illustrates the relationship between these components. The network 10 includes a
variety of resources 22, such as the printers 18, the disk aπay 20 and other storage devices, and
applications 23 and data that are stored on one or more ofthe file servers 14 and user stations 16.
The network resources 22 are administered through certain directory services 24. The
precise nature ofthe directory services 24 varies among different networks but in general the
directory services 24 administer both the location ofthe resources 22 and the rights of network
users to use the resources 22.
In a presently prefeπed embodiment the directory services 24 include services provided
by NetWare Directory Services ("NDS") software 26 that is commercially available from
Novell, Inc. of Orem, Utah (NetWare Directory Services is a trademark of Novell, Inc.). The
directory services 24 component includes a schema 28. Prior to the present invention the schema 28 was a default schema 30 that did not support application objects. The schema 28 of
the present invention is an extended schema 32 which does support application objects.
The schemas 28, 30, and 32 each include a set of "attribute syntax" definitions, a set of
"attribute" definitions, and a set of "object class" (also known as "class") definitions. The NDS
software 26 and the default NDS schema 30 are described in chapters 6 through 8 of NetWare 4
for Professionals by Bierer et al. ("Bierer"), which are incoφorated herein by reference. Certain
ideas explained in Bierer are repeated herein. The terms "attribute" and "property" are used
interchangeably in Bierer and herein, as are the terms "attribute syntax" and "property syntax."
Differences between the default schema 30 and the extended schema 32 ofthe present invention
are described in detail below after a general discussion ofthe generic schema 28.
Each attribute syntax in the schema 28 is specified by an attribute syntax name and the
kind and/or range of values that can be assigned to attributes ofthe given attribute syntax type.
Attribute syntaxes thus conespond roughly to data types such as integer, float, string, or Boolean
in conventional programming languages.
Each attribute in the schema 28 has certain information associated with it. Each attribute
has an attribute name and an attribute syntax type. The attribute name identifies the attribute,
while the attribute syntax limits the values that are assumed by the attribute. For instance, the
default schema 30 includes an attribute of syntax type integer having the name "supported
connections" which specifies the number of concunent connections a file server allows.
Each attribute may also have associated with it any or all ofthe following flags: Non¬
removable, Hidden, Public Read, Read Only, Single- Valued, Sized, and String. The general
meanings of these flags are familiar to those of skill in the art. If the Sized flag is set for a given
attribute, then upper and lower bounds (possibly including No Limit) are imposed on values
currently held by that attribute. Each object class in the schema 28 also has certain information associated with it. Each class has a name which identifies this class, a set of super classes that identifies the other classes
from which this class inherits attributes, and a set of containment classes that identifies the
classes permitted to contain instances of this class. Although the topics of class inheritance,
containment, and instantiation are familiar to those of skill in the art, their use in connection
with application object classes according to the present invention is new.
Each object class also has a container flag and an effective flag. The container flag
indicates whether the class is a container class, that is, whether it is capable of containing
instances of other classes. The effective flag indicates whether instances ofthe class can be
defined. Non-effective classes are used only to define attributes that will be inherited by other
classes, whereas effective classes are used to define inheritable attributes, to define instances, or
to define both.
In addition, each object class groups together certain attributes. The naming attributes of
a class are those attributes that can be used to name instances ofthe class. The mandatory
attributes of a class are those attributes that must exist in each valid instance ofthe class and/or
become mandatory attributes of classes which inherit from the class. The optional attributes of a
class are those attributes that may, but need not, exist in each valid instance ofthe class.
Optional attributes of a parent class become optional attributes of a child class which inherits
from the parent class, unless the attributes are mandatory in some other parent class from which
the child inherits, in which case they are also mandatory in the child.
An object is an instance of an object class. Different objects ofthe same class have the
same mandatory attributes but may have different cuπent values in their coπesponding
mandatory attributes. Different objects ofthe same class may have different optional attributes,
and/or different cuπent values in their coπesponding optional attributes. The directory services 24 also include an interface library 34 which provides access to
the schema 28 and to a database 38. The schema 28 is an API-extensible schema in that the
attributes and object classes found in the schema can be altered through an Application
Programmers' Interface ("API") without direct access to the source code that implements the
schema 28. In some embodiments the interface library 34 includes tables or commands stored in
a file which is read by the schema 28 during its initialization and when objects are created,
thereby defining the available attributes and classes.
In addition or as an alternative, the interface library 34 includes a set of routines that are
available to other code to access and modify the schema 28. In one embodiment the interface
library 34 includes an API that defines an interface to an NWDSxxx() library 36 which is
commercially available from Novell, Inc. of Orem, Utah. The NWDSxxx() library 36 is so
named because the names of functions and data types defined in the library 36 typically begin
with "NWDS," an acronym for "NetWare Directory Services." The use of particular elements of
the NWDSxxx() library 36 in connection with the present invention is described hereafter.
The database 38 contains objects 49 and 51 that are defined according to the schema 28
and the particulars ofthe network 10. These objects 49 and 51 represent resources 22 ofthe
network 10. The database 38 is a "hierarchical" database 38 because the objects 49 and 51 in the
database 38 are connected in a hierarchical tree structure. Objects in the tree that can contain
other objects are called "container objects" and must be instances of a container object class.
The database 38 is also a "synchronized-partition" database 38. The database 38 is
typically divided into two or more non-overlapping partitions. To improve the response time to
database 38 queries and to provide fault-tolerance, a replica of each partition is physically stored
on one or more file servers 14 in the network 10. The replicas of a given partition are regularly
updated by the directory services 24 through an automated synchronization process, thereby reducing the differences between replicas caused by activity on the network 10. In one embodi¬
ment, the database 38 includes a Novell NetWare Directory Services database ("NDS database")
40.
Administration and use ofthe resources 22 are supported by the directory services 24, by
administrator tools 42, and by user tools 44. Typical administrator tools 42 include partition
management routines 46 for managing the partitions ofthe database 38.
The present invention supplements the previously available administrator tools 42 by
providing application management routines 48 for creating, deleting, and modifying application
objects 49 and/or desktop attributes on user, group, and container objects 51 in the database 38.
The addition of application objects 49 to the database 38 and other features ofthe present invention make application programs 23 available to network administrators and users in a previously unknown, uniform, convenient, and efficient manner.
The present invention also provides users with an application launcher 50 for initiating
execution of applications 23 through their coπesponding application objects 49. In addition, the
present invention provides desktop attributes on user, group, and container objects 51 which
modify previously known desktop environments 52 to facilitate the use ofthe application
objects 49. User, group, container, and or other objects 51 which have a desktop attribute are
herein termed "desktop objects."
With reference to Figures 1, 2, and 3, the application management routines 48, as well as
the schema 28 and the database 38, include a tangible embodiment stored in one or more
program storage devices. Suitable storage devices include floppy disks, hard disks, tape, CD-
ROMs, and other computer usable media. Each program storage device is readable by one or
more ofthe file servers 14 and user stations 16. Each program storage device tangibly embodies a program, functions, or instructions that are executable by the machines 14 and/or 16 to
perform application managing steps ofthe present invention as described herein.
In one embodiment the application management routines 48 are located in a "snap-in"
module 54 stored in a .DLL file on a disk in the Microsoft® Windows™ environment ("Micro-
soft" is a registered trademark, and "Windows" is a trademark, of Microsoft Corporation).
Figure 3 illustrates steps that are taken by the snap-in module 54 to modify the directory services
24 in order to support the application management routines 48. Some of these steps modify the
directory services schema 28. Modifications to the schema 28 include the addition of at least
one class that defines application objects 49 and the addition of attributes which enhance the
visibility and ease of use of those application objects 49. Other steps taken by the snap-in
module 54 provide network administrators with control over application objects 49 by adding
routines that allow administrators to create, modify, and delete the application objects 49
available to a given user, group, or container class.
One embodiment makes the new routines 48 available through the familiar NWAdmin
tool interface, but those of skill in the art will appreciate that the routines 48 could also be
provided in connection with programs other than NWAdmin. NWAdmin is a commercially
available extendable tool used by network administrators to manage objects in the database 38.
The module 54 extends NWAdmin to support application objects 49.
As shown in Figures 2 and 3, the initial step taken by the snap-in module 54 is a
registration step 60 which registers the snap-in module 54 with NWAdmin. In alternative
embodiments, the routines 48 are registered with another administration program to make them
available for use by an administrator. During the registration step 60 menu items and
procedures coπesponding to operations on application objects 49 and desktop objects 51 are registered with NWAdmin by appropriate calls to the standard function NWARegisterObject- Proc().
In one embodiment ofthe snap-in module 54 the first application object procedure
registered is SnapinApplicationProc(), a function which receives and processes messages from
NWAdmin. In response to the NWA MSG INITSNAPIN message, SnapinApplicationProc()
initializes NWAPageStruct interface page structures titled "Identification," "Contacts,"
"Environment," "Options," "Scripts," "Licensing," and "View Associations," and registers coπe¬
sponding menu item interface pages with NWAdmin. Appropriate titles for these structures and
suitable groupings ofthe attributes and classes ofthe present invention under each title are
readily determined by those of skill in the art. SnapinApplicationProc() also manages device
context information in Windows environments and similar information in other environments.
In addition, SnapinApplicationProc() invokes NWAAddClassData() to register with NWAdmin
the bitmap and other interface information associated with new application object classes added
by the snap-in module 54.
In response to the NWA_MSG_CREATEOBJECT message, SnapinApplicationProc()
registers a dialog box which allows administrators to browse through executable files on the
network 10, through existing application objects 49, or both, and to optionally invoke the
necessary routines 48 to create a new application object 49. Browsing may be performed with a
standard browsing tool.
In response to the NWA_MSG_GETVALIDOPERATIONS message,
SnapinApplicationProc() registers the following set of bitflags: NWA_OP_DETAILS,
NWA_OP_RENAME, NWA_OP_DELETE, NWA_OP_DSTYPE, NWA_OP_CREATE.
Those of skill will appreciate that different operations may be valid in other embodiments ofthe
snap-in module 54 ofthe present invention. In response to the NWA_MSG_GETPAGECOUNT message, SnapinApplicationProc()
first invokes a snap-in function DSGetAliasedObjectName() which retums the name ofthe
object 49 or 51 that is referenced by an alias if an alias is passed in and retums the name passed
in if that name is not an alias. SnapinApplicationProc() then creates a local copy ofthe
information in the object 49 to maintain a record of administrator modifications to the object 49
until such time, if any, as the administrator directs the snap-in module 54 to enter the
modifications into the database 38. Finally, SnapinApplicationProc() retums the number of
interface pages to NWAdmin.
In response to successive NWA MSG REGISTERPAGE messages (one for each
interface page), SnapinApplicationProc() registers the next interface page with NWAdmin.
Those of skill will appreciate that altemative embodiments ofthe present invention vary the
order in which the pages are registered, as well as the specific manner in which infoimation and
operations regarding objects 49 and 51 are divided between the interface pages. User interface
mechanisms other than interface pages are utilized in altemative embodiments.
In response to the NWA_MSG_MODIFY message, SnapinApplicationProc() invokes a
snap-in function Modify ApplicationData() to modify the specified application object 49. Here
and elsewhere throughout the snap-in module 54 the administrator is provided with appropriate
enor messages if a requested operation fails.
In response to the NWA_MSG_RENAME message, SnapinApplicationProc() simply
retums NWA_RET_DODEFAULT. In response to the NWA_MSG_QUERYDELETE
message, SnapinApplicationProc() removes any relevant licensing certificate and deletes the
identified application object 49. Finally, in response to the NWA_MSG_CLOSESNAPIN
message, SnapinApplicationProc() frees the memory it allocated, closes files (if any) that it
opened, and otherwise cleans up. Some embodiments of SnapinApplicationProc() also invoke NWARemoveClassData() to remove the bitmaps added earlier to NWAdmin's class tables.
Some embodiments remove the new application object classes from the schema 28; altemative
embodiments leave the schema modifications in place after termination ofthe snap-in module
54.
In this embodiment ofthe registration step 60 ofthe snap-in module 54, the next
application object procedure registered is SnapinDesktopProcO, which receives and processes
messages from NWAdmin regarding desktop attributes on desktop objects 51 in a manner
analogous to the manner in which SnapinApplicationProc() receives and processes messages
regarding application objects 49. Thus, in response to NWA_MSG_INITSNAPIN,
NWA_MSG_GETPAGECOUNT, and N WA_MSG_REGISTERPAGE messages, Snapin¬
DesktopProcO creates and registers with NWAdmin an interface page titled "Desktop Objects."
Likewise, SnapinDesktopProcO takes care to identify aliases and to allow changes to desktop
attributes on desktop objects 51 in the database 38 only after confirmation by the administrator.
Other SnapinDesktopProcO steps, such as modifying or closing steps, are readily determined by
those of skill in the art according to the teachings herein.
With continued reference to Figure 3, the registration step 60 is followed by a query step
62 and possibly by a modification step 64. The query step 62 determines whether additional
modifications need to be made to the schema 28 in order to realize the present invention.
Suitable modifications include defining new attributes and/or new object classes. In some
embodiments the query step 62 queries the user to obtain authority to perform the identified
modifications to the schema 28; in others, authority is presumed. If an additional modification
is identified and authorized, it is performed during the modification step 64 in a manner which
will be described in connection with Figures 5 through 7 hereafter. The query step 62 is then
repeated until no further modifications are identified. After the modifications to the schema 28 are completed, the snap-in module 54 performs
a context capture step 66. In one embodiment, the context is captured by the following sequence
of calls:
Context = CreateContext(); NWDSSetContext( Context, DCK_NAME_CONTEXT, DS_ROOT_NAME );
NWDSWhoAmI( Context, UserName );
The variable Context is of type NWDSContextHandle, and is a buffer used by NWDSxxx()
calls. The variable UserName is an anay of characters which contains the name ofthe user who
is presently running NWAdmin. CreateContext() is a snap-in module 54 function which invokes
NWDSCreateContext() to create a local copy ofthe context, calls NWDSGetContext() to
initialize that local copy, and then sets the following bitflags in the context using
NWDSSetContext(): DCV_TYPELESS_NAMES, DCV_XLATE_STRINGS,
DCV_DEREF_ALIASES, DCV_DEREF_BASE_CLASS.
In modifying the database 38, care is taken to provide users of application objects 49 and
desktop objects 51 with database rights which include both the object's cunent rights and the
rights specified expressly or implicitly by the network administrator during use ofthe snap-in
module 54.
After the context capture step 66, the snap-in module 54 goes into an event handling loop
which includes a message reception step 68 and a message handling step 70. The event handling
loop proceeds as set forth above in connection with the registered object procedures Snapin-
ApplicationProc() and SnapinDesktopProcO, which receive the messages from NWAdmin and
handle them accordingly. The event handling loop also supports conventional steps such as
terminating the snap-in module 54.
Although an event-driven administrator tool 54 is shown in Figure 3, those of skill in the
art will recognize that other programming paradigms are employed in altemative embodiments ofthe present invention. Figure 4 illustrates one altemative embodiment ofthe routines 48 of Figure 2 in the form of a command-driven administrator tool 72. The event-driven tool 54 and
the command-driven tool 72 contain coπesponding components which accomplish similar
results. Additional paradigms are used in other embodiments ofthe present invention.
With reference to Figures 2, 3, and 4, the command-driven tool 72 responds to an
"initialize" command with an initialization step 74 which initializes bitmaps, interface pages,
menus, and other user interface elements in a manner analogous to the registration step 60 ofthe
event-driven tool 54. In the embodiment shown in Figure 4, the initialization step 74 also
modifies the schema 28 to add new attributes and classes substantially as described in
connection with Figures 5 through 7. If other software in the environment ofthe command-
driven tool 72 requires page counts, page registration, identification of valid operations on the
objects 49 and 51, or similar user interface information, that information is also provided by the
tool 72 during the initialization step 74.
The command-driven tool 72 responds to a "configure browser" command with a
browser configuration step 76 which sets default filter characteristics of a browser. Suitable
browser filter characteristics include the name of an object class, a flag indicating whether to
expand volumes during browsing, and a flag indicating whether to restrict selections to a single
object 49 or 51. Suitable browser filter characteristics also include contextual information such
as the user's name and location in the hierarchy ofthe network 10.
The command-driven tool 72 responds to a "create object" command with a browser
enablement step 78 followed by an object creation enablement step 80. The browser enablement
step 78 initiates or resumes execution ofthe browser, thereby allowing the administrator to scan
the existing objects 49 and 51, files, and/or cuπent attribute values. Browsing allows the
administrator to determine whether an object 49 or 51 with some or all ofthe desired attributes and attribute values already exists. In one embodiment, the browser enablement step 78 initiates
execution of a flat (non-hierarchical) browser by invoking NWALaunchFSFlatBrowser().
The object creation enablement step 80 obtains the path name of a new object 49 or 51
from the administrator. One embodiment converts the path name to a Universal Naming
Convention ("UNC") path name if necessary. The object creation enablement step 80 creates an
object 49 or 51 having the given name and other attribute values specified by the administrator
or by default.
To create an application object 49, one embodiment ofthe step 80 first creates a local
copy ofthe context by calling NWDSDuplicateContext(). NWDSSetContext() is then called to
set the DCK_NAME_CONTEXT in the local copy ofthe context equal to the name ofthe
container object in the database 38 that will contain the new application object 49. A buffer to
hold the new application object 49's attribute values is allocated by calling NWDSAllocBuf()
and initialized by calling NWDSInitBuf(). Mandatory attributes ofthe new application object
49 are initialized by calling NWDSPutAttrName() and NWDSPutAttrVal() for each attribute.
Then NWDSAddObject() is invoked with the context and cunent mandatory attribute values as
parameters to create the object 49 in the database 40. The new application object 49's icon data
is stored in a file by calling NWDSOpenStream(), _lwrite(), and close(). Finally, the buffer and
the local copy ofthe context are freed by calling NWDSFreeBuf() and NWDSFreeContext().
Similar steps are taken with desktop objects 51.
A modification step 82 taken in response to a "modify" command performs in a manner
analogous to the message handling step 70 ofthe event-driven tool 54 to modify the attribute
values of an application object 49. In one embodiment, the modification step 82 invokes
NWDSGetSyntaxID(), NWDSPutChange(), and NWDSPutAttrVal() to modify application
object 49 attributes after updating a local buffer. The local buffer is allocated and initialized substantially as in the object creation step 80 and then overwritten with the modifying values.
The modification step 82 then invokes NWDSModifyObject() to make the requested changes.
A remove license step 84 is taken in response to a delete command. The remove license
step 84 communicates with the licensing server and/or takes other steps readily determined by
those of skill in the art to remove the license rights for the application 23. A delete application
object step 86 then invokes standard NWDSxxx() or equivalent routines to delete the selected
application object 49.
A close-and-clean-up step 88 closes opened files, detaches from the directory service 24,
frees allocated memory, and takes similar steps in response to a "close" command. In one
embodiment, the step 88 gives the administrator the option of restoring the database 38 and/or
the schema 28 to their original condition prior to execution ofthe tool 72.
As shown in Figures 2, 5, and 6, the schema modification step 64 includes an attribute
definition and addition step 90 which in turn includes separate definition and addition steps 91
through 120 for new attributes which are added to the schema 28 according to the present
invention. A description ofthe new attributes shown in Figure 6 is provided below.
The step 91 defines and adds a "desktop" attribute having a distinguished name attribute
syntax and no flags. The desktop attribute takes as its value a list of application objects 49 that
should be displayed for a given desktop object 51. In an embodiment utilizing the NDS
database 40, the desktop attribute is added to the User, Organizational Role, Group,
Organizational Unit, and Organization classes. In a presently prefened embodiment, the
desktop attribute is not added to the Organizational Role class because doing so degrades
performance.
As used herein, the term "desktop object" includes any object 51 in the database 38
which is an instance of a class containing the desktop attribute. Associating desktop attributes with container classes allows application objects 49 to be located on desktops 52 that are
accessible to more than one user. In altemative embodiments the desktop attribute is added to a
subset of these classes and/or to other container classes such as Country.
When an application object 49 is added to the desktop attribute, care should be taken to
give the desktop object 51 read and compare rights to all ofthe application object 49's attributes,
as well as any other rights granted to the application 23 's executable code file by the filesystem.
Otherwise, users may be unable to launch and successfully execute an application 23 even
though the network administrator attempted to enable them to do so by placing the application
object 49 in a desktop object 51.
To define and add the desktop attribute, one embodiment ofthe step 91 invokes
memsetO to initialize a struct in RAM to hold the new attribute's values, and then sets the syntax
type in that struct to indicate that the new desktop attribute has the distinguished name syntax type. This embodiment then invokes in turn NWDSDefιneAttr(), NWDSAllocBuf(),
NWDSInitBuf(), NWDSPutAttrName(), NWDSModifyClassDef(), and NWDSFreeBuf() with
parameters readily determined by those familiar with these functions. The other attributes
described herein are defined and added by analogous function calls, with parameter differences
readily determined by those of skill in the art.
The step 93 defines and adds an "auto start" attribute having a typed name attribute
syntax and no flags. The auto start attribute takes as its value a list of application objects 49 that
should automatically run on the desktop 52 when the application launcher 50 is started from the
desktop 52.
When the auto start attribute is created or modified, care should be taken to give each
desktop object 51 read and compare rights to all the application object 49's attributes, as well as
any other rights granted to the application 23 by the filesystem. Otherwise, an application 23 may fail to launch and successfully execute even though the network administrator placed the
application object 49 in the auto start list.
The auto start attribute is added to the desktop classes. In one embodiment these classes
include the User, Organizational Role, Group, Organizational Unit, and Organization classes. In
altemative embodiments the auto start attribute is added to a subset of these classes and/or to
other container classes such as Country. In a presently prefened embodiment, the auto start
attribute is not added to the Organizational Role class because doing so degrades performance.
The step 96 defines and adds a "launcher configuration" attribute having a stream
attribute syntax and having the Single- Valued flag. In one embodiment the launcher
configuration attribute takes as its value a stream. In altemative embodiments an integer
attribute syntax is used and the attribute's values are treated as bitflags and/or bitfields.
The launcher configuration attribute contains various indications regarding the desired
behavior ofthe launcher 50. Suitable indications include an indication whether the application
launcher 50 should use its default settings, indications regarding icon refresh, an indication
whether a user is allowed to resize the window displaying the application object icons, an
indication whether the application icons should be automatically sorted prior to their display, an
indication whether the launcher 50's window size and position should be stored on the local disk
drive, the number of container levels between the user's object and the root ofthe hierarchical
database 38 which should be scanned for application object 49 icons to display, and an
indication whether to allow the user to drag and drop icons out ofthe launcher 50 to the desktop
52.
Suitable refresh indications include an indication whether the user is allowed to manually
refresh the application object 49 icons displayed on the desktop 52 and an indication whether the
application object 49 icons should be automatically refreshed after each time interval of a specified length elapses. Icon refresh is discussed further in connection with Figure 8. Other
embodiments contain different launcher configuration indications.
When the launcher configuration attribute of a user or container object is modified, care
should be taken to give the object read and compare rights to the launcher configuration
attribute. In one embodiment, the launcher configuration attribute is added to the User,
Organizational Unit, and Organization classes. In altemative embodiments the launcher
configuration attribute is added to different or additional desktop classes.
The step 98 defines and adds an "icon" attribute having a stream attribute syntax and
having the Single-Valued flag. In a prefened embodiment the icon attribute takes as its value a
stream containing a list of application object 49 icons in the *.ICO file format. The icon
attribute is added to a generic application objects class in the schema 28.
In conventional systems, icon data defining one or more icons for an application 23 is
stored in the application 23's executable file. The icons that might be displayed on the desktop
52 are therefore typically scattered among multiple file servers 14 (Figure 1). Using the present
invention's icon attribute to hold an additional copy of some or all of this icon data allows icons
for all ofthe application objects 49 that are visible to the user to be obtained from the central
database 38. Thus, it is not necessary to attach to a server 14 that holds an available application
23 unless and until the user wishes to launch that application 23.
The step 100 defines and adds a "file path" attribute having a case ignore string attribute
syntax and having the Single-Valued flag. In one embodiment the file path attribute takes as its
value the full path (including server name) to the application object's *.EXE, *.COM, *.BAT, or
other executable file. In altemative embodiments the server name is maintained in a separate
case ignore string single-valued "server" attribute or a configurable default format. In some
embodiments, the file path attribute is multi-valued rather than single-valued, and contains one or more executable file paths. Listing several file paths increases the possibility of launching an
application 23 in the event a particular server 14 becomes unavailable. The file path attribute is
added to the generic application objects class. In some embodiments, fault tolerance is
provided at a higher level by an application fault tolerance object 53 (Figure 2). The application
fault tolerance object 53 includes a list which references a plurality of application objects 49.
One suitable embodiment ofthe list uses an "altemate application objects" attribute having a
distinguished name attribute syntax and no flags. Altematively, the altemate application objects
attribute may be added to the generic application objects class.
Under one method of operation, the network administrator places application objects 49
in the same list if they differ only in which server 14 (Figure 1) holds the executable code.
Thus, the application launcher 50 could easily locate a replacement application object 49 to
launch if a server 14 goes down. Altematively, the "best" (i.e., newest, fastest, physically
closest, located on least loaded server, or most reliable) version of an application 23 could be
listed first, with less desirable versions following in order of decreasing desirability.
The step 102 defines and adds a "working directory" attribute having a case ignore string
attribute syntax and having the Single- Valued flag. In one embodiment the working directory
attribute takes as its value the full path (including server name) to the application's working
directory. The working directory attribute is added to the generic application objects class.
The step 104 defines and adds a "flags" attribute having an integer attribute syntax and
having the Single- Valued flag. In one altemative embodiment the flags attribute is multi-valued.
The flags attribute value is treated as a bitset. In one embodiment the bits indicate whether to
automatically minimize the application window and whether to restore the original drive
mappings or printer port assignments after an application 23 terminates. The flags attribute is
added to the generic application objects class. The step 106 defines and adds a "blurb" attribute having a case ignore string attribute
syntax and having the Single- Valued flag. The blurb value is a short description ofthe
application 23 telling a user who may be unfamiliar with the application 23 what the application
23 provides and why the user might want to use the application 23. Like the icon attribute, the
blurb attribute may be used as a brief identifier to access the application object 49 in the
database 38. The blurb attribute is added to the generic application objects class.
The steps 108 and 110 define and add a "startup script" and a "shutdown script" attribute,
respectively. Each script attribute has a stream attribute syntax and the Single- Valued flag. The
startup script attribute value is a script to run before the application 23 executes, while the
shutdown script attribute value is a script to run after the application 23 terminates. In one
embodiment, each script is in NetWare Login Script format. The script attributes are added to
the generic application objects class.
The step 1 12 defines and adds a "licensing" attribute having a stream attribute syntax and
having the Single-Valued flag. In one embodiment, the licensing value includes information
needed by the NetWare Licensing Server to verify the scope and validity ofthe application 23 's
license. The licensing attribute is added to the generic application objects class.
The step 114 defines and adds a "parameters" attribute having a case ignore string
attribute syntax and having the Single- Valued flag. In one altemative embodiment the
parameters attribute has a stream attribute syntax. The parameters attribute value includes
command line parameters to be passed to the application 23 when it is launched. The
parameters attribute is added to the generic application objects class.
The step 116 defines and adds a "drive mappings" attribute having a case ignore string
attribute syntax. The drive mappings attribute value includes a list of drives which must be
mapped by the application launcher 50 prior to executing the application 23. One suitable format is: Drivel := Pathl ; Drive2 := Path2, and so forth. Other suitable formats follow the standard syntax for the NetWare MAP.EXE utility. The drive mappings attribute is added to the
generic application objects class.
The step 118 defines and adds a "printer ports" attribute having a case ignore string
attribute syntax. The printer ports attribute value includes a list of printer ports which must be
captured by the application launcher 50 prior to executing the application 23. One suitable
format is: Portl := Queuel; Port2 := Queue2, and so forth. Other suitable formats follow the
standard syntax for the NetWare CAPTURE.EXE utility. The printer ports attribute is added to
the generic application objects class.
The step 120 defines and adds a "contacts" attribute having a distinguished name attribute syntax. The contacts attribute value includes a list of other network users who may be
able to help if this user has a problem with the application 23. In general, the public should
therefore be granted read rights to the contacts attribute in each application object. The contacts
attribute is added to the generic application objects class.
Altemative embodiments ofthe present invention select different attributes to define
application objects. By way of example and without limitation, some embodiments omit one or
more ofthe attributes and attribute definition steps described above. Other embodiments omit
only one or more ofthe following attributes: flags, blurb, startup script, shutdown script,
licensing, and contacts. The user interface and other portions of these altemative embodiments
contain conesponding changes readily determined by those of skill in the art. Other embodi¬
ments ofthe invention define one or more ofthe attributes differently than the illustrative
description provided above. By way of example and not limitation, in altemative embodiments
one or more ofthe attributes sets the Non-removable flag and/or uses a different attribute syntax. In one altemative embodiment, the step 90 defines and adds a "handler" attribute having
a distinguished name syntax and no flags. The handler attribute value includes a list of handlers
such as *.INI handlers for the application 23. The handler attribute is added to the generic
application objects class.
In one altemative embodiment, the step 90 defines and adds a "searchmap path" attribute
having a distinguished name syntax and no flags. The searchmap path attribute value includes a
list of directories to search for files referenced by the application 23 in a manner analogous to
use ofthe familiar DOS search path. The searchmap path attribute is added to the generic
application objects class.
In one altemative embodiment, the step 90 defines and adds a "catch-all" attribute having
a stream syntax and no flags. The catch-all attribute value includes application-defined values,
such as values in a generic data field, in order to satisfy prerequisites or to invoke options for
execution ofthe application 23. The catch-all attribute is added to the generic application
objects class.
In one altemative embodiment, a step ofthe present invention adds a "see also" attribute
having a distinguished name syntax and no flags. The see also attribute value includes a list of
desktop objects having a desktop attribute whose value includes the name ofthe application
object 49. The see also attribute is added to the generic application objects class.
With reference to Figures 2 and 5, the step 90 of defining and adding new attributes is
followed by the step 92 of defining and adding the generic application objects class. Creation of
the generic class is followed by a step 94 which defines and adds one or more platform-specific
application objects classes that inherit from the generic application objects class. The steps 92
and 94 are further illustrated in Figure 7. Definition and addition of a class in the schema 28 includes a step 122 of allocating and
initializing a buffer to hold information about the new class. In one embodiment, the step 122
includes calls to NWDSAllocBuf() and NWDSInitBuf(). During a step 124 the super classes of
the new class are defined by successive calls to NWDSBeginClassItem() and NWDSPut-
ClassItemO or equivalent means. During a step 126 the containment classes ofthe new class are
defined by similar successive calls to NWDSBeginClassItem() and NWDSPutClassItem() or
equivalent means.
During additional steps 128, 130, and 132, the naming attributes, mandatory attributes,
and optional attributes, respectively, ofthe new class are defined. In one embodiment each of
the steps 128, 130, and 132 includes an initial call to NWDSBeginClassItem() followed by calls
to NWDSPutClassItemO for each ofthe naming attributes, each ofthe mandatory attributes, and each ofthe optional attributes, respectively. Finally, NWDSDefineClass() is invoked to create
the new class in the schema 28.
With reference to Figures 2, 5, and 7, in one embodiment ofthe present invention the
step 92 defines and adds to the schema 28 a generic application objects class which has Top as
its superclass, and Organization and Organizational Unit as its containment classes. The generic
application objects class is a noneffective container class having the familiar common name
attribute as its naming attribute, and having mandatory attributes which include file path,
description, and common name. The description attribute's value is a name that appears
underneath the application 23 's icon on the desktop 52. In one altemative embodiment the
description attribute is optional rather than mandatory.
In another embodiment, the file path attribute is optional rather than mandatory. An
application object would contain a script only, with no ultimate executable launched and tumed
over to the user. This would be particularly useful to perform software installation. The generic class's optional attributes include the following attributes defined in the step
90 (Figure 6): icon, working directory, flags, blurb, startup script, shutdown script, licensing,
parameters, drive mappings, printer ports, and contacts. Other embodiments define the generic
class differently, or omit the generic class entirely and use only platform-specific classes.
One embodiment ofthe step 94 defines and adds to the schema 28 a platform-specific
Windows (version 3.x and/or Windows 95) application objects class which has the generic class
defined in the step 92 as its superclass. This Windows application class is an effective non-
container class which inherits the naming attributes, mandatory attributes, and optional attributes
ofthe generic class. Other embodiments ofthe present invention similarly define other
platform-specific classes for the DOS, Macintosh, OS/2, UNIX®, and/or NT® environments
(OS/2 is a mark of Intemational Business Machines Corporation; UNIX is a registered
trademark of Novell, Inc.; NT is a registered trademark of Microsoft Coφoration).
With reference to Figures 2 and 8, the application launcher 50 is associated with the
desktop environment 52. In some embodiments ofthe present invention, the application
launcher 50 and the application management routines 48 are combined in a single tool, similar to
NWAdmin. These embodiments allow a user to readily browse for application objects 49 and/or
to perform a "Yellow Pages" search ofthe database 38 for a particular application object 49 and
to then launch that application object 49. In other embodiments, the application launcher 50
performs a search within the database 38 by searching the desktop attribute in one or more
desktop objects 51.
In "bootstrap" embodiments ofthe present invention, a small piece of code on the client
16 reads a user object's container object in the database 38 when a user logs on. The container
object has a stream syntax "application launcher bootstrap" attribute which contains the
executable code for the application launcher 50. One method ofthe present invention includes the step of reading executable launcher code from the application launcher bootstrap attribute in
the database 38. After the bootstrap attribute value is read by the client 16, the application
launcher 50 is executed. Storing the application launcher 50 in a stream attribute provides the
advantages, such as replication and distribution, of storage in the database 38.
With reference to Figure 8, the launcher 50 performs a reading step 139. During the
reading step 139, the launcher 50 reads the cuπent value ofthe launcher configuration attribute
from the schema database 38 and stores that information in a local buffer.
In one embodiment, the value ofthe launcher configuration attribute, as well as the
values of other attributes, are read from the schema database 38 substantially as follows. Two
buffers are allocated in the schema 28 by invoking NWDSAllocBuf(). One buffer will hold the
values of all attributes of an object 49 or 51, and the other will hold those values which are of interest. The first buffer is initialized by calling NWDSInitBuf(). Calls are then made to
NWDSReadO, NWDSGetAttrCountO, NWDSGetAttrName(), and NWDSPutAttrName() to
copy the values of interest from the first buffer into the second buffer. Finally, one call to
NWDSGetAttrCountO and the coπesponding number of calls to NWDSGetAttrName() are
made to copy the values from the schema 28 into the launcher 50's memory. NWDSCompute-
AttrValSize() is called to determine the amount of memory needed by the launcher 50 to hold
the attribute value(s) of interest. NWDSFreeBuf() is then called twice to free the two database
38 buffers.
The launcher 50 also performs an auto start launching step 140 to launch each ofthe
applications 23 specified in the auto start attribute ofthe desktop object 51. Embodiments
which omit the auto start definition step 93 (Figure 6) also omit the auto start launching step
140. As elsewhere, enor messages are provided to the user and/or to the network administrator
if an attempted step fails. As explained, the icon for an application 23 is preferably stored in the icon attribute in
addition to its usual storage in the application 23 's executable file. Accordingly, the application
launcher 50 performs a get-icons step 142 to obtain from the directory services database 38 the
icons of all applications 23 listed in the desktop attribute.
In one embodiment, the get-icons step 142 is accomplished using software which is
based generally on the icon.c file in the October 1994 Microsoft Development Library CD-ROM
distributed as part ofthe Microsoft Developer Network. In one embodiment, the icon.c file is
modified in ways readily determined by those of skill in the art to work with the Borland Object
Windows Library ("OWL") rather than the standard Windows API. Thus, the MakeIcon()
function in icon.c is modified to retum a pointer to an OWL Ticon structure rather than a
Windows HICON stmcture. The ReadIcon() function in icon.c is modified to retum the icon
that best fits the available screen resolution, number of colors, and system metric for the icon
size rather than simply reading the first icon. Altemative embodiments use other code to read
the icon data from the icon attribute and/or to create a conesponding icon for display on the
desktop 52.
During a browse/search step 143, the launcher 50 performs browsing and/or searching as
requested by the user. Suitable browsers for performing the step 143 include without limitation
familiar flat browsers, other familiar browsers, and browsers ofthe type provided in the
NWAdmin tool. Searching during the step 143 may include specifying search parameters or
using previously specified search parameters. Searching may also include a specification of how
much ofthe hierarchical database 38 tree to search. Suitable search algorithms are readily
determined by those of skill in the art, and include without limitation algorithms for "yellow
page" searches ofthe type performed by NWAdmin. After the icons are displayed on the desktop 52, the launcher 50 responds to commands
or events provided by the user. One such command orders the launcher 50 to perform a manual
icon refresh step 144. Icon refresh is useful because the network administrator may have added
new application objects 49 to those available to the user, may have deleted other application
objects 49, and/or may have changed the cunent attribute values of still other application objects
49 after the launcher 50 last read those values.
The launcher 50 maintains an intemal list of application objects 49 for which icons are
cuπently displayed. The manual refresh step 144 causes the launcher 50 to scan a portion ofthe
database 38 to determine whether the launcher 50's intemal list differs from the attributes listed
in the desktop attribute ofthe desktop 52 in the database 38. The portion ofthe database 38 hierarchy searched is specified by the container levels value stored in the launcher configuration attribute ofthe user and container objects. In one embodiment timestamps are used to detect
changes to the database 38. In another string comparison similar to that performed by strcmpO
to detect name changes. Any differences detected are reflected in the intemal list and other
intemal data ofthe launcher 50 and in the icons displayed on the terminal screen.
The user may also order the launcher 50 to perform a viewing step 146. The viewing
step 146 displays the cunent values of predetermined attributes. One embodiment displays all
ofthe attributes of application objects 49 whose icons are cuπently displayed to the user. The
embodiment illustrated in Figure 8 displays the attribute values but does not allow users to
change those values. An altemative embodiment allows users to change the value of selected
attributes, such as the parameters attribute and/or the contacts attribute.
In connection with the viewing step 146, the user is able to ask a contact for help during
an asking step 148. In one embodiment, the asking step 148 includes viewing the cunent value
ofthe contacts attribute, selecting a particular contact person, and then selecting that contact person's email address or telephone number. In response, the launcher 50 initiates email coπe¬
spondence with the contact person or dials the contact person's telephone number, respectively,
by invoking standard communications software. For instance, email conespondence is readily
initiated by the launcher 50 through the Messaging API protocol promulgated by Microsoft or
through other standard communications interfaces.
Of course, the user may also select a specific application 23 and order the launcher 50 to
perform an application launching step 150. In an embodiment tailored to the Windows
environment, the application 23 is selected for launching by double-clicking a mouse button
after positioning a desktop cursor over the application 23's displayed icon. The launching step
150 is discussed below in connection with Figures 9 through 11.
With continued reference to Figures 2 and 8, the launcher 50 also takes certain steps not
directly requested by the user. For instance, the launcher 50 maintains an intemal stmcture that
reflects the cunent status of each application 23 launched by the launcher 50. This status
information includes user interface information such as drive mappings, printer port captures,
and server attachments made by the launcher 50 before launching the application 23; and an
indication whether the application 23 has terminated. The launcher 50 detects termination of an
application 23 by polling, by an interrupt or event notification, or by other familiar means.
Changes in the application 23's status are reflected in the launcher 50's intemal stmcture during a
status updating step 152.
If an application 23 launched by the launcher 50 terminates, the launcher 50 updates the
status information and then cleans up during a cleaning step 154. The cleaning step 154, which
proceeds according to the settings in the application object's flags attribute, possibly includes
unmapping drives, releasing captured printer ports, detaching from servers 14 (Figure 1), and
releasing memory used intemally by the launcher 50 to hold the application's status information. If the launcher configuration attribute indicates that icons should be automatically refreshed, then an icon updating step 156 is also performed without a direct user request. Aside
from being initiated by the launcher 50, the icon updating step 156 is substantially similar to the
user-initiated manual icon refresh step 144. Both ofthe steps 144 and 156 are performed to
reduce the workload ofthe network administrator by reducing or eliminating the need for the
administrator to manually update user desktops 52 after changing the application objects 49 in
the schema database 38.
With reference to Figures 2, 8, and 9, the step 140 of launching the auto start applications
23 includes repeated performance of a launching step 158, with one repetition being performed
for each application 23 specified in the auto start attribute ofthe desktop 52. The step 150 of
launching a user-selected application 23 includes a single performance ofthe launching step 158.
In the embodiment illustrated, the launching step 158 includes a disabling step 160
which disables both the application status updating step 152 and the automatic icon updating
step 156. Disabling the updating steps 152 and 156 simplifies subsequent steps ofthe launching
step 158 by preventing inconsistencies in the launcher 50's status information.
During a setup step 162, a resource setup routine then sets up resources needed by the
application 23 that is being launched. The setup step 162 also sets standard flags that
communicate with operating system process creation routines. The setup step 162 is described
further below in connection with Figure 10.
A process initialization step 164 invokes an operating system routine or other process
initializer to initialize a process control block or similar process control stracture used by the
operating system. The step 164 also allocates a processor to a process, task, or thread conesponding to the application 23. In an embodiment tailored to the Windows environment,
the step 164 includes a call to ShellExecute() or CreateProcess().
An update status step 166 then updates the launcher 50's intemal application status
information to indicate that the application 23 has been launched. In one embodiment, the step
166 also records a process ID, instance handle, task handle, or other process identifier supplied
by successful completion ofthe process initializer call in the step 164.
An enabling step 168 then reverses the disabling effects ofthe step 160. This allows the
updating steps 152 and 156 to proceed again. If the user interface was changed during the step
160 to indicate that launching is underway, such as by displaying an hourglass cursor, then that
change is also reversed by the step 168.
During a yielding step 170, a control transferor transfers control of a processor in the
network to the process initialized during the step 164. The launcher 50 suspends itself, invokes
a sleep function, or otherwise yields control ofthe processor to the newly launched process of
the application 23 to allow execution ofthe application program. In one embodiment tailored to
the Windows environment, the step 170 includes a call to Yield().
Those of skill in the art will recognize that other embodiments ofthe invention may
include different steps which accomplish substantially the same results as the steps 160 through
170. For instance, the step 164 may be combined with the step 170 in environments which
provide a single system call to create a new process and pass control to that process. In some
such embodiments the relative order ofthe steps 162 and 166 is reversed. In addition, the
disabling step 160 and the enabling step 168 are omitted in embodiments which do not use
intermpt or event paradigms. That is, the steps 160 and 168 are omitted when there is no risk of
creating inconsistent status information in the launcher 50 during the step 158. With reference to Figures 2, 10, and 11, a reading step 174 reads the value ofthe flags
attribute. If the minimize flag is set, the launcher 50 launches the application 23 telling it to run
minimized.
A drive mapping step 176 follows the sequence described in Figure 11. In the drive
mapping step 176 the "resources" refeπed to in Figure 11 are disk drives and the step of
"claiming" includes mapping a drive. A port capturing step 178 likewise follows the sequence
described in Figure 11 , but in the step 178 the resources are printer ports and the step of
claiming includes capturing a printer port for use by the application 23. After a step 180 which
determines the location ofthe executable code for the application 23, an attaching step 182 also
follows the sequence described in Figure 11. In the attaching step 182, the resources are servers
14 (Figure 1) and the step of claiming includes attaching the desktop 52 to a server 14 that
contains the application 23's executable code.
In one embodiment, the step 180 of determining the executable code location utilizes
both the value ofthe file path attribute ofthe application object and the result of processing
references to attributes or environment variables. One suitable format is the same as that used in
login or other scripts, possibly with a distinguished name prefix. In other embodiments the step
180 does not reference environment variables. In environments that support UNC names, the
step 180 preferably includes string manipulations to create an UNC name.
In one embodiment, a step 184 of determining the location ofthe application's working
directory utilizes both the value ofthe working directory attribute ofthe application object and
the result of processing attributes or environment variables. In other embodiments environment
variables are not referenced. The step 184 may also include a conversion to the UNC format. Likewise, a step 186 of determining the command line parameters may utilize both the
value ofthe parameters attribute ofthe application object and the result of processing attributes
or environment variables. Altematively, environment variables may be ignored.
Figure 11 illustrates the stmcture of each ofthe steps 176, 178, and 182 of Figure 10. A
querying step 188 determines whether additional resource claims made by the application 23
have not yet been addressed. Thus, in the drive mapping step 176, the querying step 188
determines whether any additional drives need to be mapped by checking to see if all ofthe
mappings listed in the drive mappings attribute have been addressed by the launcher 50. In the
port capturing step 178, the querying step 188 similarly determines whether any additional
printer ports need to be captured by checking the printer ports attribute, and in the server
attaching step 182, the querying step 188 determines whether any additional servers 14 (Figure
1) need to be attached by checking the file path attribute.
If another resource (drive, port, or server) needs to be claimed by the application 23 that
is being launched and a second querying step 190 determines that the resource has not been
claimed by any process, then a claiming step 192 claims the resource for the application 23. To
make its determinations, the second querying step 190 examines the intemal status information
ofthe launcher 50 during the drive mapping step 176 and the port capturing step 178, and calls
NWGetConnectionStatus() during the attaching step 182.
In the drive mapping step 176, the claiming step 192 provides substantially the same
functionality as the familiar DOS map command. In the port capturing step 178, the claiming
step 192 provides substantially the same functionality as the familiar DOS capture command. In
one embodiment ofthe server attaching step 182, the claiming step 192 calls
NWAttachToFileServerO to create a server 14 attachment. If the second querying step 190 determines that the resource has already been claimed by
the application 23 being launched or by another process, a third querying step 194 is taken. The
step 194 determines whether the previous claim and the claim sought by the application 23 are
consistent. In the drive mapping step 176, the third querying step 194 passes control to an enor
reporting step 196 if the drive assignments already made differ from those requested in a manner
that prevents any drive listed in the drive mappings attribute from being mapped. In the port
capturing step 178, the third querying step 194 similarly compares previously made port
assignments with those listed in the application's printer ports attribute. However, in the server
attaching step 182, the third querying step 194 typically finds no enor because desktops 52 can
be simultaneously attached to more than one server 14.
If the resource was previously claimed and that previous claim is consistent with the
needs ofthe application 23 now being launched, an incrementing step 198 increments a use
counter that is maintained within the launcher 50. Thus, resources are only claimed as often as
needed by the launcher 50 on behalf of applications 23. In particular, unnecessary multiple
attachments to the same server 14 are avoided. During the clean up step 154 (Figure 8), the use
count is decremented unless the flags attribute indicates otherwise. The resource is freed only
when the use count reaches zero.
With reference to all Figures, articles of manufacture within the scope ofthe present
invention include a computer-readable storage medium in combination with the specific physical
configuration of a substrate ofthe computer-readable storage medium. The substrate
configuration represents data and instructions which cause the computers 14 and 16 to operate in
a specific and predefined manner as described herein. Suitable storage devices include floppy
disks, hard disks, tape, CD-ROMs, RAM, and other media 11 (Figure 1) readable by one or
more ofthe computers 14, 16. Each such medium tangibly embodies a program, functions, and/or instructions that are executable by the machines 14 and/or 16 to perform application
managing steps ofthe present invention substantially as described herein.
In summary, as illustrated in Figure 2 the present invention provides a computer-
implemented method and apparatus for consistently tracking and employing information about
application programs 23 and their execution environments in the network 10. Consistency is
achieved by gathering the execution environment information into the application objects 49 and
desktop objects 51 in the database 38, and by routing database 38 accesses through specially
tailored tools such as the NWAdmin snap-in 54, the desktop 52 interface, and the application
launcher 50. Database 38 and desktop 52 updates and refreshes are performed with the
application management routines 48 and the application launcher 50, thereby reducing the effort
associated with changes in the location of application program 23 executable codes or changes
in the other information needed to execute the applications 23.
The invention may be embodied in other specific forms without departing from its spirit
or essential characteristics. The described embodiments are to be considered in all respects only
as illustrative and not restrictive. Any explanations provided herein ofthe scientific principles
employed in the present invention are illustrative only. The scope ofthe invention is, therefore,
indicated by the appended claims rather than by the foregoing description. All changes which
come within the meaning and range of equivalency ofthe claims are to be embraced within their
scope.
What is claimed and desired to be secured by patent is:

Claims

1. A method of managing an application in a network, comprising the steps
of:
selecting attributes for the application, one attribute capable of having as
its value a brief identifier; and
accessing a central hierarchical database containing at least one
application object defined by an application object class in a schema ofthe
database, the accessing step using the brief identifier.
2. The method of claim 1, wherein the selecting step comprises selecting
another attribute capable of having as its value at least one file path specifying a location of an
executable code ofthe application.
3. The method of claim 1, wherein the accessing step includes the step of
browsing by displaying at least some ofthe attribute values of selected application objects in the
database.
4. The method of claim 1 , wherein the accessing step includes the steps of
defining an application object that is an instance ofthe application object class and adding the
created application object to the database.
5. The method of claim 1 , wherein the accessing step includes the steps of
selecting an application object that is an instance ofthe application object class and deleting the
selected application object from the database.
6. The method of claim 1, wherein the accessing step includes the steps of
selecting an application object that is an instance ofthe application object class and modifying
the value of at least one attribute ofthe selected application object in the database.
7. The method of claim 1 , wherein the accessing step includes the step of
assigning rights to access resources in the network.
8. The method of claim 1 , wherein the accessing step is followed by the step
of launching the application.
9. A method of managing an application in a network, comprising the steps of:
selecting attributes for the application, one attribute capable of having as
its value a brief identifier;
extending a schema which defines a central hierarchical database by defining and adding at least one application object class having the attributes
selected during the selecting step; and
accessing the database after the extending step by using the brief
identifier.
10. The method of claim 9, wherein the selecting step comprises selecting
another attribute capable of having as its value at least one file path specifying a location of an
executable code ofthe application.
11. The method of claim 9, wherein the accessing step includes the step of
browsing by displaying at least some ofthe attribute values of selected application objects in the
database.
12. The method of claim 9, wherein the accessing step includes the steps of
defining an application object that is an instance ofthe application object class and adding the
created application object to the database.
13. The method of claim 9, wherein the accessing step includes the steps of
selecting an application object that is an instance ofthe application object class and deleting the
selected application object from the database.
14. The method of claim 9, wherein the accessing step includes the steps of
selecting an application object that is an instance ofthe application object class and modifying
the value of at least one attribute ofthe selected application object in the database.
15. The method of claim 9, wherein the accessing step includes the step of
assigning rights to access resources in the network.
16. The method of claim 9, wherein the accessing step is followed by the step
of launching the application.
17. The method of claim 9, wherein the extending step includes extending a
NetWare Directory Services schema.
18. A method of managing an application in a multi-server network,
comprising the steps of:
selecting attributes for the application, one attribute capable of having as
its value a brief identifier and another attribute capable of having as its value at
least one file path specifying a location of an executable code ofthe application,
the file path specifying both a network server name and an executable file name;
extending an API-extensible schema which defines a hierarchical
synchronized-partition database by defining and adding at least one application
object class having the attributes selected during the selecting step;
accessing an application object in the database after the extending step by
using the brief identifier; and launching the application by using information obtained during the
accessing step.
19. The method of claim 18, wherein the launching step includes selecting an
icon which is the brief identifier ofthe application.
20. The method of claim 18, wherein the launching step includes the step of
mapping a drive.
21. The method of claim 18, wherein the launching step includes the step of
capturing a printer port.
22. The method of claim 18, wherein the launching step includes the step of
attaching to a server in the network.
23. The method of claim 18, wherein the launching step is preceded by the
step of executing a startup script which is among the application object's attributes.
24. The method of claim 18, wherein the launching step is followed by the
step of executing a shutdown script which is among the application object's attributes.
25. The method of claim 18, wherein the attributes ofthe application object
include a command line for passing parameters to the application, and the launching step
includes the step of passing command line parameters to the application.
26. The method of claim 18, further comprising the steps of:
defining an auto start attribute which has as its value a list of application
objects to be automatically started by a desktop; and
adding the auto start attribute to the database.
27. The method of claim 18, further comprising the steps of:
defining a flags attribute which contains a list of application settings to be
utilized during the launching step; and
adding the flags attribute to the database.
28. The method of claim 18, further comprising the steps of:
defining a desktop attribute which contains a list of application objects
whose icons are to be automatically displayed by a desktop; and
adding the desktop attribute to the database.
29. The method of claim 18, further comprising an icon refresh step for
detecting changes to application objects in the database.
30. An application object in a computer network having at least one file
server and at least one user station, the application object having a plurality of attributes, each
attribute having a name, a syntax, and a cuπent value, the syntax limiting the values assumed by
the attribute, the plurality of attributes comprising:
a file path attribute having a string attribute syntax and having as its
cunent value at least one location of an executable code of an application
program; and
a common name attribute having a string attribute syntax and having as its
cunent value a textual name briefly identifying the application program.
31. The object of claim 30, wherein the plurality of attributes further
comprise an icon attribute.
32. The object of claim 30, wherein the plurality of attributes further
comprise a working directory attribute.
33. The object of claim 30, wherein the plurality of attributes further comprise a flags attribute.
34. The object of claim 30, wherein the plurality of attributes further
comprise a blurb attribute.
35. The object of claim 30, wherein the plurality of attributes further
comprise a startup script attribute.
36. The object of claim 30, wherein the plurality of attributes further
comprise a shutdown script attribute.
37. The object of claim 30, wherein the plurality of attributes further
comprise a licensing attribute.
38. The object of claim 30, wherein the plurality of attributes further
comprise a command line parameters attribute.
39. The object of claim 30, wherein the plurality of attributes further
comprise a drive mappings attribute.
40. The object of claim 30, wherein the plurality of attributes further
comprise a printer ports attribute.
41. The object of claim 30, wherein the plurality of attributes further
comprise a contacts attribute.
42. The object of claim 30, wherein the plurality of attributes further
comprise a handler attribute.
43. The object of claim 30, wherein the plurality of attributes further
comprise a searchmap path attribute.
44. The object of claim 30, wherein the plurality of attributes further
comprise a catch-all attribute.
45. The combination of a plurality ofthe application objects of claim 30 with
an application fault tolerance object that is also in the computer network, the application fault
tolerance object including a list which references the plurality of application objects.
46. An application launcher for launching an application program in a
computer network, the application launcher comprising:
a resource setup routine for setting up network resources for use by the
application program; and
a process initializer for causing an operating system to initialize a process
control stmcture for the application program.
47. The application launcher of claim 46, further comprising a control
transferor for yielding control of a processor in the network to a process for execution ofthe
application program.
48. The application launcher of claim 46, wherein the resource setup routine
maps drives only as needed.
49. The application launcher of claim 46, wherein the resource setup routine
captures printer ports only as needed.
50. The application launcher of claim 46, wherein the resource setup routine attaches servers only as needed.
51. The application launcher of claim 46, further comprising a routine which
reads configuration settings from a launcher configuration attribute located in a hierarchical
synchronized-partition database of network resources.
52. The application launcher of claim 51 , wherein the configuration settings
comprise a flag controlling manual icon refresh by a user.
53. The application launcher of claim 51 , wherein the configuration settings
comprise a flag controlling automatic icon refresh.
54. The application launcher of claim 51 , wherein the configuration settings
comprise a value controlling the number of container levels to search for application objects.
55. A program storage device readable by a machine and tangibly embodying
at least one routine executable by the machine to perform method steps for managing an
application in a network containing the machine, the method steps comprising:
selecting attributes for the application, one attribute capable of having as
its value a brief identifier; and
accessing a central hierarchical database containing at least one
application object defined by an application object class in a schema ofthe
database, the accessing step using the brief identifier.
56. The device of claim 55, wherein the accessing step includes the step of
browsing by displaying at least some ofthe attribute values of selected application objects in the
database.
57. The device of claim 55, wherein the accessing step includes the steps of
defining an application object that is an instance ofthe application object class and adding the
created application object to the database.
58. The device of claim 55, wherein the accessing step includes the steps of
selecting an application object that is an instance ofthe application object class and deleting the
selected application object from the database.
59. The device of claim 55, wherein the accessing step includes the steps of
selecting an application object that is an instance ofthe application object class and modifying
the value of at least one attribute ofthe selected application object in the database.
60. The device of claim 55, wherein the accessing step includes the step of
assigning rights to access resources in the network.
61. The device of claim 55, wherein the method further comprises an icon
refresh step for detecting changes to application objects in the database.
62. The device of claim 55, wherein the method further comprises the steps
of:
defining a desktop attribute which contains a list of application objects
whose icons are to be automatically displayed by a desktop; and adding the desktop attribute to the database.
63. The device of claim 55, wherein the method further includes the step of
launching the application.
64. The device of claim 63, wherein the method further includes the step of
reading executable launcher code from an attribute in the database.
65. The device of claim 63, wherein the launching step includes the step of
mapping a drive to a drive identifier.
66. The device of claim 63, wherein the launching step includes the step of
capturing a printer port.
67. The device of claim 63, wherein the launching step includes the step of
attaching to a server in the network.
68. The device of claim 63, wherein the launching step is preceded by the
step of executing a startup script which is among the application object's attributes.
69. The device of claim 63, wherein the launching step is followed by the step
of executing a shutdown script which is among the application object's attributes.
70. The device of claim 63, wherein the attributes ofthe application object
include a command line for passing parameters to the application, and the launching step
includes the step of passing command line parameters to the application.
71. The device of claim 63, wherein the method further comprises the steps
of:
defining an auto start attribute which has as its value a list of application
objects to be automatically started by a desktop; and
adding the auto start attribute to the database.
72. The device of claim 63, wherein the method further comprises the steps
of: defining a flags attribute which contains a list of application settings to be utilized during the launching step; and
adding the flags attribute to the database.
PCT/US1996/011263 1995-07-07 1996-07-03 Method and apparatus for managing applications in a network WO1997003399A1 (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
DE69616329T DE69616329T2 (en) 1995-07-07 1996-07-03 METHOD FOR CONTROLLING APPLICATION PROGRAMS IN A NETWORK
CA002226360A CA2226360C (en) 1995-07-07 1996-07-03 Method and apparatus for managing applications in a network
JP9505887A JPH10511201A (en) 1995-07-07 1996-07-03 Method and apparatus for managing applications in a network
EP96923633A EP0838055B1 (en) 1995-07-07 1996-07-03 Method for managing applications in a network

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US08/499,711 1995-07-07
US08499711 US5692129B1 (en) 1995-07-07 1995-07-07 Managing application programs in a computer network by using a database of application objects

Publications (1)

Publication Number Publication Date
WO1997003399A1 true WO1997003399A1 (en) 1997-01-30

Family

ID=23986385

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US1996/011263 WO1997003399A1 (en) 1995-07-07 1996-07-03 Method and apparatus for managing applications in a network

Country Status (6)

Country Link
US (2) US5692129B1 (en)
EP (1) EP0838055B1 (en)
JP (1) JPH10511201A (en)
CA (1) CA2226360C (en)
DE (1) DE69616329T2 (en)
WO (1) WO1997003399A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE19853665A1 (en) * 1998-11-20 2000-05-31 Siemens Ag Vehicle communication system and method for exchanging data in a motor vehicle
US6886017B1 (en) 1999-04-30 2005-04-26 Elata Limited System and method for managing distribution of content to a device
KR100767785B1 (en) * 2005-06-22 2007-10-18 (주)에이티솔루션 Application update system for a mobile terminal

Families Citing this family (134)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6141663A (en) * 1994-03-18 2000-10-31 Unimax Systems Corporation Automatic external data synchronization method
US6047312A (en) * 1995-07-07 2000-04-04 Novell, Inc. System for replicating and associating file types with application programs among plurality of partitions in a server
AU6678096A (en) * 1995-07-20 1997-02-18 Novell, Inc. Transaction synchronization in a disconnectable computer and network
US7930340B2 (en) * 1995-11-13 2011-04-19 Lakshmi Arunachalam Network transaction portal to control multi-service provider transactions
US8037158B2 (en) * 1995-11-13 2011-10-11 Lakshmi Arunachalam Multimedia transactional services
US8271339B2 (en) * 1995-11-13 2012-09-18 Lakshmi Arunachalam Method and apparatus for enabling real-time bi-directional transactions on a network
US6003037A (en) * 1995-11-14 1999-12-14 Progress Software Corporation Smart objects for development of object oriented software
KR100191269B1 (en) * 1996-08-23 1999-06-15 윤종용 A computer system testing method using hard disk
DE19635233A1 (en) * 1996-08-30 1998-03-12 Siemens Ag Microcomputer-controlled medical diagnostic or therapeutic apparatus
US5918054A (en) * 1996-11-06 1999-06-29 Ncr Corporation Distributed electronic performance support systems
US6078951A (en) * 1996-11-27 2000-06-20 Intel Corporation Method and apparatus for automating a software delivery system by locating, downloading, installing, and upgrading of viewer software
US6105069A (en) * 1997-01-22 2000-08-15 Novell, Inc. Licensing controller using network directory services
US6115549A (en) * 1997-02-12 2000-09-05 Novell, Inc. Directory-services-based software distribution apparatus and method
US7821926B2 (en) 1997-03-10 2010-10-26 Sonicwall, Inc. Generalized policy server
US7580919B1 (en) 1997-03-10 2009-08-25 Sonicwall, Inc. Query interface to policy server
US7272625B1 (en) 1997-03-10 2007-09-18 Sonicwall, Inc. Generalized policy server
US6408336B1 (en) * 1997-03-10 2002-06-18 David S. Schneider Distributed administration of access to information
US8914410B2 (en) 1999-02-16 2014-12-16 Sonicwall, Inc. Query interface to policy server
US6032121A (en) * 1997-05-15 2000-02-29 International Business Machines Corporation Method for proactive planning
US6061726A (en) * 1997-05-27 2000-05-09 Novell, Inc. Dynamic rights assignment apparatus and method using network directory services
US6345284B1 (en) * 1997-06-06 2002-02-05 Netscape Communications Corporation Extraction and tagging control palette
US6021438A (en) * 1997-06-18 2000-02-01 Wyatt River Software, Inc. License management system using daemons and aliasing
JPH1165799A (en) * 1997-08-08 1999-03-09 Fujitsu Ltd Designating device for information object
US5987471A (en) * 1997-11-13 1999-11-16 Novell, Inc. Sub-foldering system in a directory-service-based launcher
US6360262B1 (en) * 1997-11-24 2002-03-19 International Business Machines Corporation Mapping web server objects to TCP/IP ports
US6738907B1 (en) 1998-01-20 2004-05-18 Novell, Inc. Maintaining a soft-token private key store in a distributed environment
KR100336069B1 (en) 1998-06-30 2002-10-11 삼성전자 주식회사 How network management systems operate in a graphical user interface programming environment and communication devices for them
US6189103B1 (en) 1998-07-21 2001-02-13 Novell, Inc. Authority delegation with secure operating system queues
US7103646B1 (en) * 1998-08-07 2006-09-05 Hitachi, Ltd. Distributed control system and information processing system
US6370531B1 (en) * 1998-08-21 2002-04-09 International Business Machines Corporation Method and computer program product for automatic conversion of data based on location extension
US6397381B1 (en) 1998-09-21 2002-05-28 Microsoft Corporation System and method for repairing a damaged application program
US6523166B1 (en) 1998-09-21 2003-02-18 Microsoft Corporation Method and system for on-demand installation of software implementations
US7073172B2 (en) * 1998-09-21 2006-07-04 Microsoft Corporation On demand patching of applications via software implementation installer mechanism
US6836794B1 (en) * 1998-09-21 2004-12-28 Microsoft Corporation Method and system for assigning and publishing applications
US6345386B1 (en) 1998-09-21 2002-02-05 Microsoft Corporation Method and system for advertising applications
US6389589B1 (en) 1998-09-21 2002-05-14 Microsoft Corporation Class store schema
US6418554B1 (en) * 1998-09-21 2002-07-09 Microsoft Corporation Software implementation installer mechanism
US6400382B1 (en) * 1998-10-13 2002-06-04 Hewlett-Packard Company Apparatus and method for a shortcut link creation system in a computer system
US6363392B1 (en) * 1998-10-16 2002-03-26 Vicinity Corporation Method and system for providing a web-sharable personal database
US7594167B1 (en) * 1998-10-16 2009-09-22 Open Invention Network, Llc System and method for schema evolution in an e-commerce network
US6381579B1 (en) * 1998-12-23 2002-04-30 International Business Machines Corporation System and method to provide secure navigation to resources on the internet
US6353928B1 (en) 1999-01-04 2002-03-05 Microsoft Corporation First run installer
US6584507B1 (en) * 1999-03-02 2003-06-24 Cisco Technology, Inc. Linking external applications to a network management system
US7076476B2 (en) * 1999-03-02 2006-07-11 Microsoft Corporation Method and system for integrated service administration via a directory service
US6427227B1 (en) 1999-03-03 2002-07-30 Microsoft Corporation System, method, and computer-readable medium for repairing an application program that has been patched
US6542967B1 (en) 1999-04-12 2003-04-01 Novell, Inc. Cache object store
US6633906B1 (en) * 1999-04-26 2003-10-14 International Business Machines Corporation Method and system for managing windows desktops in a heterogeneous server environment
EP1610494B1 (en) * 1999-07-06 2012-03-14 Canon Kabushiki Kaisha Searching devices on a network
US6567509B1 (en) 1999-07-22 2003-05-20 International Business Machines Corporation Method and system to extend functionality of voice processing systems
US7127471B1 (en) * 1999-07-26 2006-10-24 Microsoft Corporation Automatic pruning of orphaned objects from directory services and other databases
US7865442B1 (en) * 1999-10-15 2011-01-04 Invensys Systems, Inc. Distributing and billing software according to customer use of program modules
US7395324B1 (en) * 1999-10-18 2008-07-01 Wnf Consulting Method and apparatus for maintaining a computer system
US6751658B1 (en) 1999-10-18 2004-06-15 Apple Computer, Inc. Providing a reliable operating system for clients of a net-booted environment
US7089300B1 (en) 1999-10-18 2006-08-08 Apple Computer, Inc. Method and apparatus for administering the operating system of a net-booted environment
US6609158B1 (en) 1999-10-26 2003-08-19 Novell, Inc. Component architecture in a computer system
US6754364B1 (en) * 1999-10-28 2004-06-22 Microsoft Corporation Methods and systems for fingerprinting digital data
US7680819B1 (en) * 1999-11-12 2010-03-16 Novell, Inc. Managing digital identity information
US6654748B1 (en) 1999-12-07 2003-11-25 Rwd Technologies, Inc. Dynamic application browser and database for use therewith
US6883176B1 (en) 1999-12-15 2005-04-19 Gateway, Inc. Method and apparatus for launching applications based upon electronic program guide data
US6584471B1 (en) * 2000-02-14 2003-06-24 Leon Maclin System and method for the adaptive, hierarchical receipt, ranking, organization and display of information based upon democratic criteria and resultant dynamic profiling
US7170617B1 (en) * 2000-04-17 2007-01-30 International Business Machines Corporation Method and apparatus for determining how to process incoming print jobs
US6789112B1 (en) * 2000-05-08 2004-09-07 Citrix Systems, Inc. Method and apparatus for administering a server having a subsystem in communication with an event channel
US6785713B1 (en) 2000-05-08 2004-08-31 Citrix Systems, Inc. Method and apparatus for communicating among a network of servers utilizing a transport mechanism
US6785726B1 (en) 2000-05-08 2004-08-31 Citrix Systems, Inc. Method and apparatus for delivering local and remote server events in a similar fashion
US6922724B1 (en) 2000-05-08 2005-07-26 Citrix Systems, Inc. Method and apparatus for managing server load
US7117293B1 (en) * 2000-05-12 2006-10-03 Apple Computer, Inc. Method and apparatus for archiving and unarchiving objects
US6859217B2 (en) 2000-07-19 2005-02-22 Microsoft Corporation System and method to display and manage data within hierarchies and polyarchies of information
US6714942B1 (en) 2000-07-28 2004-03-30 E-Volve Incorporated Method of creating and using a sub-classed object that spans multiple computers in a networked computing system
EP1178403A3 (en) * 2000-08-01 2005-07-27 Matsushita Electric Industrial Co., Ltd. Download system
US6895586B1 (en) * 2000-08-30 2005-05-17 Bmc Software Enterprise management system and method which includes a common enterprise-wide namespace and prototype-based hierarchical inheritance
US6834301B1 (en) * 2000-11-08 2004-12-21 Networks Associates Technology, Inc. System and method for configuration, management, and monitoring of a computer network using inheritance
US6810400B2 (en) * 2000-11-17 2004-10-26 Microsoft Corporation Representing database permissions as associations in computer schema
US6816869B2 (en) 2000-11-17 2004-11-09 Microsoft Corporation Mapping database users to operating system users in a computer schema
US20030105732A1 (en) * 2000-11-17 2003-06-05 Kagalwala Raxit A. Database schema for structure query language (SQL) server
US6961730B2 (en) * 2000-11-17 2005-11-01 Microsoft Corporation Mapping database file class to operating system file class in a computer schema
CA2326851A1 (en) * 2000-11-24 2002-05-24 Redback Networks Systems Canada Inc. Policy change characterization method and apparatus
US6957230B2 (en) * 2000-11-30 2005-10-18 Microsoft Corporation Dynamically generating multiple hierarchies of inter-object relationships based on object attribute values
US6993506B2 (en) 2000-12-05 2006-01-31 Jgr Acquisition, Inc. Method and device utilizing polymorphic data in e-commerce
US6941560B1 (en) 2000-12-19 2005-09-06 Novell, Inc. XML-based integrated services event system
US6961773B2 (en) 2001-01-19 2005-11-01 Esoft, Inc. System and method for managing application service providers
US20020103941A1 (en) * 2001-01-31 2002-08-01 Thomas Yip Method and apparatus for launching heterogeneous software programs via a common program
US6711564B2 (en) * 2001-02-15 2004-03-23 Apteryx, Inc. System and method for opening and activating applications, windows or data sets based on search criteria
JP4291467B2 (en) * 2001-03-01 2009-07-08 株式会社ソニー・コンピュータエンタテインメント Entertainment device, menu display method, and information recording medium
US6721758B1 (en) * 2001-03-30 2004-04-13 Novell, Inc. System and method for using schema attributes as meta-data in a directory service
US7047413B2 (en) 2001-04-23 2006-05-16 Microsoft Corporation Collusion-resistant watermarking and fingerprinting
US6886100B2 (en) * 2001-05-15 2005-04-26 Hewlett-Packard Development Company, L.P. Disabling tool execution via roles
US7177906B2 (en) * 2001-05-31 2007-02-13 Palmsource, Inc. Software application launching method and apparatus
US7013312B2 (en) * 2001-06-21 2006-03-14 International Business Machines Corporation Web-based strategic client planning system for end-user creation of queries, reports and database updates
US7406693B1 (en) * 2001-09-10 2008-07-29 Ncr Corporation Method of controlling applications
US6952714B2 (en) * 2001-10-02 2005-10-04 Citrix Systems, Inc. Method for distributed program execution with server-based file type association
US7330872B2 (en) * 2001-10-02 2008-02-12 Citrix Systems, Inc. Method for distributed program execution with web-based file-type association
US7117243B2 (en) * 2001-10-02 2006-10-03 Citrix Systems, Inc. Methods for distributed program execution with file-type association in a client-server network
JP3663627B2 (en) * 2001-10-18 2005-06-22 ソニー株式会社 COMMUNICATION PROCESSING DEVICE, COMMUNICATION PROCESSING METHOD, AND COMPUTER PROGRAM
US20030084071A1 (en) * 2001-11-01 2003-05-01 International Business Machines Corporation Method and system for managing computer performance
US6944626B2 (en) * 2001-11-26 2005-09-13 Microsoft Corp. Dynamically generated schema representing multiple hierarchies of inter-object relationships
US6952704B2 (en) * 2001-11-26 2005-10-04 Microsoft Corporation Extending a directory schema independent of schema modification
US7389335B2 (en) 2001-11-26 2008-06-17 Microsoft Corporation Workflow management based on an integrated view of resource identity
US6792510B1 (en) * 2002-02-14 2004-09-14 Novell, Inc. System and method for updating a cache
US20030163510A1 (en) * 2002-02-28 2003-08-28 Bob Janssen Method of administering user access to application programs on a computer system
US7203738B1 (en) * 2002-03-15 2007-04-10 Novell, Inc. System and method for distributing application objects
US7149751B1 (en) 2002-03-15 2006-12-12 Novell, Inc. System and method for distributing selected objects from a source database to a destination database
US20040054991A1 (en) * 2002-09-17 2004-03-18 Harres John M. Debugging tool and method for tracking code execution paths
US7730155B1 (en) 2002-10-01 2010-06-01 Apple Inc. Method and apparatus for dynamically locating resources
US7600234B2 (en) 2002-12-10 2009-10-06 Fisher-Rosemount Systems, Inc. Method for launching applications
JP2006520032A (en) * 2003-02-12 2006-08-31 コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ Storage medium having reserved area for file system data and application startup data
CA2425045C (en) * 2003-04-08 2013-01-15 Ibm Canada Limited - Ibm Canada Limitee Method and system for executing a database query
US7546313B1 (en) 2003-06-17 2009-06-09 Novell, Inc. Method and framework for using XML files to modify network resource configurations
US7774774B1 (en) 2003-10-22 2010-08-10 Apple Inc. Software setup system
US7275150B2 (en) * 2004-03-15 2007-09-25 International Business Machines Corporation Method and system for adding frequently selected applications to a computer startup sequence
US8010576B2 (en) * 2004-08-19 2011-08-30 Oracle International Corporation Inventory and configuration management
US8756521B1 (en) 2004-09-30 2014-06-17 Rockwell Automation Technologies, Inc. Systems and methods for automatic visualization configuration
US8010964B2 (en) * 2005-08-18 2011-08-30 Tellabs Operations, Inc. Methods for monitoring and managing processes
US7664841B2 (en) * 2005-12-07 2010-02-16 International Business Machines Corporation Selective activation of TCP/IP link and traffic
US8966456B2 (en) * 2006-03-24 2015-02-24 The Mathworks, Inc. System and method for providing and using meta-data in a dynamically typed array-based language
US7984416B2 (en) * 2006-03-24 2011-07-19 The Mathworks, Inc. System and method for providing class definitions in a dynamically typed array-based language
US7865497B1 (en) 2008-02-21 2011-01-04 Google Inc. Sitemap generation where last modified time is not available to a network crawler
US7908252B1 (en) 2008-03-19 2011-03-15 Crossroads Systems, Inc. System and method for verifying paths to a database
JP5599557B2 (en) * 2008-08-29 2014-10-01 株式会社リコー Information processing apparatus, license determination method, program, and recording medium
US20100088117A1 (en) * 2008-10-02 2010-04-08 Siemens Medical Solutions Usa, Inc. Multi-Mode Medical Data Reporting System
US9154942B2 (en) * 2008-11-26 2015-10-06 Free Stream Media Corp. Zero configuration communication between a browser and a networked media device
JP5279516B2 (en) * 2009-01-09 2013-09-04 キヤノン株式会社 Information processing apparatus, display control method, and program
JP5387015B2 (en) * 2009-02-02 2014-01-15 株式会社リコー Information processing apparatus and information processing method of information processing apparatus
US20100262557A1 (en) * 2009-04-14 2010-10-14 Ferreira Rodrigo C Systems, methods, and apparatus for guiding users in process-driven environments
US8825820B2 (en) * 2009-09-18 2014-09-02 At&T Intellectual Property I, Lp Network aware application management
EP2400387B1 (en) * 2010-06-25 2013-03-13 AVG Netherlands B.V. Method for improving the performance of computers
JP5858292B2 (en) * 2010-11-09 2016-02-10 日本電気株式会社 Anonymization device and anonymization method
US8954690B2 (en) 2011-02-12 2015-02-10 Andy Vincent Lawrence Systems and methods for managing unstructured data
JP5751881B2 (en) * 2011-03-28 2015-07-22 京セラ株式会社 Electronic device, application determination method, and application determination program
EP2757472A1 (en) 2013-01-18 2014-07-23 Dassault Systèmes A computer-implemented method for launching an installed application
US9542172B2 (en) 2013-02-05 2017-01-10 Apple Inc. Automatic updating of applications
CN103677963A (en) * 2013-12-26 2014-03-26 清华大学 Application program virtualization method and system
US9933916B1 (en) * 2014-03-19 2018-04-03 VCE IP Holding Company LLC Methods, systems, and computer readable mediums for providing user interface information associated with a computing system
US10310872B2 (en) 2017-02-21 2019-06-04 Red Hat, Inc. Transparent fast application launcher
US11256709B2 (en) * 2019-08-15 2022-02-22 Clinicomp International, Inc. Method and system for adapting programs for interoperability and adapters therefor

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5325533A (en) * 1993-06-28 1994-06-28 Taligent, Inc. Engineering system for modeling computer programs

Family Cites Families (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4555775B1 (en) * 1982-10-07 1995-12-05 Bell Telephone Labor Inc Dynamic generation and overlaying of graphic windows for multiple active program storage areas
US5109486A (en) * 1989-01-06 1992-04-28 Motorola, Inc. Distributed computer system with network and resource status monitoring
US4961224A (en) * 1989-03-06 1990-10-02 Darby Yung Controlling access to network resources
US5276883A (en) * 1989-08-03 1994-01-04 International Business Machines Corporation System and method for uniform control of local and remote applications in a data processing network
FR2658934B1 (en) * 1990-02-28 1992-04-30 Bull Sa SYSTEM ARCHITECTURE AND USE OF THIS ARCHITECTURE IN A CARD REPLACEMENT METHOD.
US5265250A (en) * 1990-03-29 1993-11-23 At&T Bell Laboratories Apparatus and methods for performing an application-defined operation on data as part of a system-defined operation on the data
AU639802B2 (en) * 1990-08-14 1993-08-05 Oracle International Corporation Methods and apparatus for providing dynamic invocation of applications in a distributed heterogeneous environment
JPH04270436A (en) * 1990-12-25 1992-09-25 Fuji Xerox Co Ltd Network system
JP3551975B2 (en) * 1991-08-28 2004-08-11 富士ゼロックス株式会社 Network resource search device, network resource access device, directory device, user terminal, network resource search method, and network resource access method
US5367635A (en) * 1991-08-29 1994-11-22 Hewlett-Packard Company Network management agent with user created objects providing additional functionality
AU3944793A (en) * 1992-03-31 1993-11-08 Aggregate Computing, Inc. An integrated remote execution system for a heterogenous computer network environment
US5355497A (en) * 1992-06-10 1994-10-11 Physiotronics Corporation File directory structure generator and retrevial tool with document locator module mapping the directory structure of files to a real world hierarchical file structure
US5423034A (en) * 1992-06-10 1995-06-06 Cohen-Levy; Leon Network file management with user determined hierarchical file structures and means for intercepting application program open and save commands for inputting and displaying user inputted descriptions of the location and content of files
US5414845A (en) * 1992-06-26 1995-05-09 International Business Machines Corporation Network-based computer system with improved network scheduling system
US5539870A (en) * 1992-10-05 1996-07-23 International Business Machines Corporation Computerized system and process for interactively managing a distributed database system
JP3370704B2 (en) * 1992-10-12 2003-01-27 株式会社日立製作所 Communication control method
US5412772A (en) * 1992-10-13 1995-05-02 Novell, Inc. System for permitting a view of an object or a user interface to be exchanged between operating system environments
US5491796A (en) * 1992-10-23 1996-02-13 Net Labs, Inc. Apparatus for remotely managing diverse information network resources
US5349642A (en) * 1992-11-03 1994-09-20 Novell, Inc. Method and apparatus for authentication of client server communication
JPH07121469A (en) * 1993-10-27 1995-05-12 Fuji Xerox Co Ltd Distributed processing system
JPH07134653A (en) * 1993-11-09 1995-05-23 Fujikura Ltd Program management device
JPH07160647A (en) * 1993-12-08 1995-06-23 Oki Electric Ind Co Ltd Distributed processing system
US5423003A (en) * 1994-03-03 1995-06-06 Geonet Limited L.P. System for managing network computer applications
US5522077A (en) * 1994-05-19 1996-05-28 Ontos, Inc. Object oriented network system for allocating ranges of globally unique object identifiers from a server process to client processes which release unused identifiers
JP3946275B2 (en) * 1995-01-10 2007-07-18 富士通株式会社 Remote installation system and method
US5655081A (en) * 1995-03-08 1997-08-05 Bmc Software, Inc. System for monitoring and managing computer resources and applications across a distributed computing environment using an intelligent autonomous agent architecture
US5689708A (en) * 1995-03-31 1997-11-18 Showcase Corporation Client/server computer systems having control of client-based application programs, and application-program control means therefor
US5729682A (en) * 1995-06-07 1998-03-17 International Business Machines Corporation System for prompting parameters required by a network application and using data structure to establish connections between local computer, application and resources required by application
US5666486A (en) * 1995-06-23 1997-09-09 Data General Corporation Multiprocessor cluster membership manager framework

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5325533A (en) * 1993-06-28 1994-06-28 Taligent, Inc. Engineering system for modeling computer programs

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
"GRAPHICAL USER INTERFACE FOR THE DISTRIBUTED COMPUTING ENVIRONMENT", IBM TECHNICAL DISCLOSURE BULLETIN, vol. 38, no. 1, 1 January 1995 (1995-01-01), pages 409/410, XP000498815 *
"METHOD FOR ADMINISTERING DOMAIN APPLICATION SETTINGS", IBM TECHNICAL DISCLOSURE BULLETIN, vol. 37, no. 4B, 1 April 1994 (1994-04-01), pages 33/34, XP000451161 *
SEKI K ET AL: "DISTRIBUTED OBJECT SYSTEM FRAMEWORK ORB", NEC RESEARCH AND DEVELOPMENT, vol. 35, no. 3, 1 July 1994 (1994-07-01), pages 292 - 297, XP000468660 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE19853665A1 (en) * 1998-11-20 2000-05-31 Siemens Ag Vehicle communication system and method for exchanging data in a motor vehicle
WO2000031606A2 (en) 1998-11-20 2000-06-02 Siemens Aktiengesellschaft Motor vehicle communication system and method for exchanging data in a motor vehicle
DE19853665B4 (en) * 1998-11-20 2005-06-30 Siemens Ag Vehicle communication system and method for exchanging data in a motor vehicle
US6941194B1 (en) 1998-11-20 2005-09-06 Siemens Aktiengesellschaft Motor vehicle communication system and method for exchanging data in a motor vehicle
US6886017B1 (en) 1999-04-30 2005-04-26 Elata Limited System and method for managing distribution of content to a device
KR100767785B1 (en) * 2005-06-22 2007-10-18 (주)에이티솔루션 Application update system for a mobile terminal

Also Published As

Publication number Publication date
US5859978A (en) 1999-01-12
US5692129A (en) 1997-11-25
CA2226360C (en) 2000-11-21
CA2226360A1 (en) 1997-01-30
US5692129B1 (en) 1999-08-17
DE69616329T2 (en) 2002-05-23
DE69616329D1 (en) 2001-11-29
EP0838055A1 (en) 1998-04-29
EP0838055B1 (en) 2001-10-24
JPH10511201A (en) 1998-10-27

Similar Documents

Publication Publication Date Title
US5692129A (en) Managing application programs in a computer network by using a database of application objects
US6173289B1 (en) Apparatus and method for performing actions on object-oriented software objects in a directory services system
US6026402A (en) Process restriction within file system hierarchies
US6047312A (en) System for replicating and associating file types with application programs among plurality of partitions in a server
US6205465B1 (en) Component extensible parallel execution of multiple threads assembled from program components specified with partial inter-component sequence information
US6226788B1 (en) Extensible network management system
US6769124B1 (en) Persistent storage of information objects
EP0817101B1 (en) Method and system for uniformly accessing multiple directory services
US6446071B1 (en) Method and system for user-specific management of applications in a heterogeneous server environment
US6505228B1 (en) Dynamic determination of execution sequence
US6105063A (en) Client-server system for maintaining application preferences in a hierarchical data structure according to user and user group or terminal and terminal group contexts
US6253368B1 (en) Dynamically debugging user-defined functions and stored procedures
EP0501610B1 (en) Object oriented distributed computing system
US6119131A (en) Persistent volume mount points
EP0732834B1 (en) System and method for determining and manipulating configuration information of servers in a distributed object environment
US6339826B2 (en) Client-server system for maintaining a user desktop consistent with server application user access permissions
US7062516B2 (en) Methods, systems, and articles of manufacture for implementing a runtime logging service storage infrastructure
US6205476B1 (en) Client—server system with central application management allowing an administrator to configure end user applications by executing them in the context of users and groups
JP3590688B2 (en) Method and system for constructing an installation plan object for installing an application
US6237092B1 (en) Client-server system with central application management allowing an administrator to configure user and group contexts during application configuration without relaunching the application
US20010023440A1 (en) Directory-services-based launcher for load-balanced, fault-tolerant, access to closest resources
US5896532A (en) Objects with run-time classes and methods of making them
KR19990087924A (en) Client-server system with central application management and providing export agent capability for retrofitting existing hardware and application into the system
CA2356563A1 (en) System for scheduling and monitoring computer processes
US5956515A (en) Method for managing multiple versions of multiple subsystems in a distributed computing environment

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): CA JP

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): AT BE CH DE DK ES FI FR GB GR IE IT LU MC NL PT SE

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
121 Ep: the epo has been informed by wipo that ep was designated in this application
ENP Entry into the national phase

Ref document number: 2226360

Country of ref document: CA

Ref country code: CA

Ref document number: 2226360

Kind code of ref document: A

Format of ref document f/p: F

WWE Wipo information: entry into national phase

Ref document number: 1996923633

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 1996923633

Country of ref document: EP

WWG Wipo information: grant in national office

Ref document number: 1996923633

Country of ref document: EP